Reflections on Slide with a Twist Attacks.
Itai DinurOrr DunkelmanNathan KellerAdi ShamirPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- countermeasures
- malicious users
- computer security
- security mechanisms
- security threats
- java card
- injection attacks
- security flaws
- secure routing
- stream cipher
- terrorist attacks
- malicious attacks
- denial of service attacks
- database
- watermarking scheme
- computer systems
- digital images
- cooperative
- database systems
- real time