Login / Signup
WDDL is Protected against Setup Time Violation Attacks.
Nidhal Selmane
Shivam Bhasin
Sylvain Guilley
Tarik Graba
Jean-Luc Danger
Published in:
FDTC (2009)
Keyphrases
</>
countermeasures
malicious users
malicious attacks
unauthorized access
database
database systems
constraint violations
security mechanisms
computer security
buffer overflow
data corruption
cyber attacks
image watermarking
watermarking scheme
information security
multiscale
data mining