A comparative investigation of approximate attacks on logic encryptions.
Yuanqi ShenAmin RezaeiHai ZhouPublished in: ASP-DAC (2018)
Keyphrases
- logic programming
- countermeasures
- automated reasoning
- malicious users
- classical logic
- comparative analysis
- watermarking scheme
- exact solution
- traffic analysis
- security risks
- malicious attacks
- data mining
- multi valued
- security mechanisms
- security protocols
- defeasible logic
- image watermarking
- security threats
- deontic logic
- denial of service attacks