Login / Signup
Coping with physical attacks on random network structures.
Omer Gold
Reuven Cohen
Published in:
ICC (2014)
Keyphrases
</>
chosen plaintext
countermeasures
security mechanisms
malicious attacks
malicious users
physical world
uniformly distributed
randomly generated
data sets
search engine
database systems
evolutionary algorithm
wireless sensor networks
smart card
watermarking scheme
computer security