Login / Signup
Key substitution attacks revisited: Taking into account malicious signers.
Jens-Matthias Bohli
Stefan Röhrich
Rainer Steinwandt
Published in:
Int. J. Inf. Sec. (2006)
Keyphrases
</>
malicious attacks
malicious users
malicious behavior
detect malicious
block cipher
insider attacks
data mining
malicious code
detecting malicious
hidden markov models
computer security
cryptographic protocols