Sign in

Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.

Christian KraetzerRonny MerkelRobert AltschaffelEric ClausingJana Dittmann
Published in: MM&Sec (2011)
Keyphrases
  • semi automated
  • pros and cons
  • communication protocol
  • fully automated
  • communication protocols
  • access control
  • management system