Preventing UDP Flooding Amplification Attacks with Weak Authentication.
Edoardo BiagioniPublished in: ICNC (2019)
Keyphrases
- security mechanisms
- semi fragile watermarking
- detect malicious
- digital watermarking
- biometric authentication
- resource constrained
- watermarking scheme
- smart card
- end to end
- countermeasures
- biometric template
- security issues
- security requirements
- image authentication
- wireless networks
- security systems
- access control
- tcp ip
- user authentication
- key distribution
- ddos attacks
- copyright protection
- authentication scheme
- computer security
- rate control
- biometric data
- multimodal biometrics
- data encryption
- watermarking algorithm
- video streaming
- digital images