Login / Signup
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs.
Simon McNicol
Serdar Boztas
Asha Rao
Published in:
AAECC (2006)
Keyphrases
</>
countermeasures
information retrieval
malicious attacks
real time
neural network
watermarking scheme
artificial intelligence
high level
multiscale
cooperative
design principles
security protocols
denial of service attacks
terrorist attacks
chosen plaintext