Keyphrases
- ddos attacks
- identity theft
- smart card
- security analysis
- mobile devices
- authentication protocol
- countermeasures
- security mechanisms
- chosen plaintext
- mobile applications
- watermarking scheme
- malicious attacks
- traffic analysis
- security protocols
- neural network
- watermarking algorithm
- denial of service attacks
- watermarking technique
- dos attacks
- cryptographic protocols
- text to speech
- security threats
- smart phones
- attack detection
- daily life
- web services