Login / Signup
Election Attacks with Few Candidates.
Yongjie Yang
Published in:
CoRR (2014)
Keyphrases
</>
countermeasures
malicious attacks
security threats
terrorist attacks
data sets
watermarking scheme
security mechanisms
security protocols
java card
watermarking algorithm
image watermarking
cyber attacks
data publishing
malicious users