Login / Signup
Opportunities and Limits of Remote Timing Attacks.
Scott A. Crosby
Dan S. Wallach
Rudolf H. Riedi
Published in:
ACM Trans. Inf. Syst. Secur. (2009)
Keyphrases
</>
mobile robot
countermeasures
watermarking scheme
traffic analysis
database systems
real time
malicious attacks
website
malicious users
terrorist attacks
wide area network
security threats
image watermarking
computer security
security mechanisms
access control
cooperative