Login / Signup
Verification Based Scheme to Restrict IoT Attacks.
Barjinder Kaur
Sajjad Dadkhah
Pulei Xiong
Shahrear Iqbal
Suprio Ray
Ali A. Ghorbani
Published in:
BDCAT (2021)
Keyphrases
</>
countermeasures
security problems
management system
face verification
java card
watermarking scheme
signature verification
formal verification
watermarking method
malicious attacks
image watermarking scheme
chosen plaintext