Warding off timing attacks in Deterland.
Weiyi WuEnnan ZhaiDaniel JackowitzDavid Isaac WolinskyLiang GuBryan FordPublished in: CoRR (2015)
Keyphrases
- web pages
- countermeasures
- watermarking scheme
- malicious attacks
- traffic analysis
- chosen plaintext
- data mining
- security flaws
- security risks
- security threats
- security protocols
- computer security
- cryptographic protocols
- asynchronous circuits
- watermarking algorithm
- terrorist attacks
- digital image watermarking
- data corruption
- access control
- differential power analysis
- case study