Login / Signup

Key substitution attacks revisited: Taking into account malicious signers.

Jens-Matthias BohliStefan RöhrichRainer Steinwandt
Published in: Int. J. Inf. Sec. (2006)
Keyphrases
  • malicious attacks
  • malicious users
  • malicious behavior
  • detect malicious
  • block cipher
  • insider attacks
  • data mining
  • malicious code
  • detecting malicious
  • hidden markov models
  • computer security
  • cryptographic protocols