Login / Signup
L-collision Attacks against Randomized MACs.
Michael Semanko
Published in:
CRYPTO (2000)
Keyphrases
</>
collision detection
countermeasures
watermarking scheme
traffic analysis
terrorist attacks
web services
malicious attacks
security threats
chosen plaintext
privacy preserving association rule mining
secure routing
buffer overflow
malicious users
database
java card
decision forest
access control
data sets