Login / Signup
Towards characterizing the effectiveness of random mobility against actuation attacks.
Alexandra Czarlinska
Deepa Kundur
Published in:
Comput. Commun. (2007)
Keyphrases
</>
chosen plaintext
database
countermeasures
data sets
watermarking scheme
mobile networks
computer security
security protocols