Login / Signup

Association attacks: Identifying association protocols.

Tingting SunYanyong ZhangWade Trappe
Published in: WOWMOM (2012)
Keyphrases
  • security protocols
  • association analysis
  • database
  • data sets
  • databases
  • search engine
  • multi agent
  • digital images
  • cryptographic protocols