Login / Signup
On A²-Codes Including Arbiter's Attacks.
Thomas Johansson
Ben J. M. Smeets
Published in:
EUROCRYPT (1994)
Keyphrases
</>
countermeasures
error correction
watermarking scheme
traffic analysis
denial of service attacks
image watermarking
security threats
security risks
watermarking algorithm
terrorist attacks
logical operations
malicious users
neural network
watermarking technique
cryptographic protocols
attack detection