Login / Signup
Detecting relay attacks with timing-based protocols.
Jason Reid
Juan Manuel González Nieto
Tee Tang
Bouchra Senadji
Published in:
AsiaCCS (2007)
Keyphrases
</>
security protocols
cryptographic protocols
network intrusion detection systems
security flaws
watermarking scheme
countermeasures
security properties
traffic analysis
sensor networks
multi party
computer security
security risks
ip multicast