How to Withstand Mobile Virus Attacks, Revisited.
Joshua BaronKarim El DefrawyJoshua LampkinsRafail OstrovskyPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- mobile devices
- mobile learning
- countermeasures
- virus detection
- denial of service attacks
- context aware
- mobile technologies
- traffic analysis
- mobile phone
- computer virus
- mobile environments
- mobile services
- digital images
- attack detection
- security protocols
- mobile computing
- m learning
- ddos attacks
- communication technologies
- watermarking algorithm
- malicious users
- watermarking scheme