Keyphrases
- countermeasures
- malicious users
- watermarking scheme
- security protocols
- database
- security risks
- denial of service attacks
- malicious attacks
- secure routing
- java card
- security threats
- stream cipher
- block cipher
- chosen plaintext
- differential power analysis
- attack detection
- terrorist attacks
- security mechanisms
- computer networks
- cooperative
- case study