Keyphrases
- smart card
- java card
- power consumption
- countermeasures
- security analysis
- neural network
- power distribution
- security threats
- security mechanisms
- low cost
- watermarking technique
- recommender systems
- traffic analysis
- real time
- watermarking scheme
- computational power
- cost effective
- authentication protocol
- cryptographic protocols
- data mining
- digital image watermarking
- chosen plaintext