Login / Signup
Wiretap-channels with constrained active attacks.
Carsten Rudolf Janda
Christian Scheunert
Eduard A. Jorswieck
Published in:
ACSSC (2014)
Keyphrases
</>
countermeasures
multi channel
real time
data sets
cooperative
traffic analysis
database
watermarking scheme
watermarking algorithm
communication channels
computer security
security risks
attack detection