Keyphrases
- user defined
- countermeasures
- query processing
- watermarking scheme
- multi agent
- partially ordered
- traffic analysis
- highly relevant
- malicious attacks
- cyber attacks
- terrorist attacks
- data structure
- java card
- data corruption
- probabilistic xml
- security mechanisms
- chosen plaintext
- website
- watermarking algorithm
- database systems