Login / Signup

The lotus-eater attack.

Ian A. KashEric J. FriedmanJoseph Y. Halpern
Published in: PODC (2008)
Keyphrases
  • countermeasures
  • dos attacks
  • detection mechanism
  • secret key
  • data sets
  • image processing
  • cooperative
  • search algorithm
  • multi agent systems
  • authentication protocol
  • malicious attacks
  • digital watermark