Non-malleability under Selective Opening Attacks: Implication and Separation.
Zhengan HuangShengli LiuXianping MaoKefei ChenPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- countermeasures
- malicious attacks
- watermarking scheme
- information systems
- security mechanisms
- image watermarking
- traffic analysis
- security threats
- malicious users
- data mining
- security risks
- data publishing
- functional dependencies
- cryptographic protocols
- cyber attacks
- privacy preserving
- denial of service attacks
- bayesian networks
- genetic algorithm