Login / Signup
Off-Path Hacking: The Illusion of Challenge-Response Authentication
Yossi Gilad
Amir Herzberg
Haya Shulman
Published in:
CoRR (2013)
Keyphrases
</>
security analysis
shortest path
computer generated
intelligence and security informatics
database
data sets
neural network
authentication scheme