Login / Signup

Towards characterizing the effectiveness of random mobility against actuation attacks.

Alexandra CzarlinskaDeepa Kundur
Published in: Comput. Commun. (2007)
Keyphrases
  • chosen plaintext
  • database
  • countermeasures
  • data sets
  • watermarking scheme
  • mobile networks
  • computer security
  • security protocols