Login / Signup
Practical attack on NLM-MAC scheme.
Mohammad Ali Orumiehchiha
Josef Pieprzyk
Ron Steinfeld
Published in:
Inf. Process. Lett. (2014)
Keyphrases
</>
real world
detection mechanism
data sets
neural network
motion estimation
denoising
intrusion detection system
countermeasures
secret key
secret sharing scheme
blind signature scheme
authentication mechanism
key agreement