Login / Signup
On the power of active relay attacks using custom-made proxies.
Thomas Korak
Michael Hutter
Published in:
IEEE RFID (2014)
Keyphrases
</>
domain specific
power consumption
countermeasures
denial of service attacks
digital images
watermarking scheme
website
cooperative
cyber attacks
security threats
malicious attacks
attack detection
malicious users
digital image watermarking