Login / Signup
Differential Forgery Attack Against LAC.
Gaëtan Leurent
Published in:
SAC (2015)
Keyphrases
</>
digital images
signature verification
multiscale
secret key
cyber attacks
countermeasures
real time
neural network
genetic algorithm
malicious attacks
attack detection
attack scenarios
attack graphs
defense mechanisms