Login / Signup

Wiretap-channels with constrained active attacks.

Carsten Rudolf JandaChristian ScheunertEduard A. Jorswieck
Published in: ACSSC (2014)
Keyphrases
  • countermeasures
  • multi channel
  • real time
  • data sets
  • cooperative
  • traffic analysis
  • database
  • watermarking scheme
  • watermarking algorithm
  • communication channels
  • computer security
  • security risks
  • attack detection