Login / Signup
Hunting SIP Authentication Attacks Efficiently.
Tomás Jánský
Tomás Cejka
Václav Bartos
Published in:
AIMS (2017)
Keyphrases
</>
security mechanisms
countermeasures
authentication and key agreement
security problems
semi fragile watermarking
intrusion detection
watermarking algorithm
computer security
digital watermarking