Login / Signup
Inversion Attack and Branching.
Jovan Dj. Golic
Andrew J. Clark
Ed Dawson
Published in:
Aust. Comput. J. (1999)
Keyphrases
</>
image reconstruction
branch and bound
case study
search tree
lightweight
detection mechanism
attack detection
digital watermark
key exchange protocol