Login / Signup
Evaluating Adversarial Robustness of Secret Key-Based Defenses.
Ziad Tariq Muhammad Ali
Ameer Mohammed
Imtiaz Ahmad
Published in:
IEEE Access (2022)
Keyphrases
</>
secret key
smart card
authentication scheme
secure communication
pseudorandom
public key
stream cipher
key distribution
key management
security level
hash functions
forward secure
key agreement
authentication protocol
network security
encryption decryption
data sets
secret data
spatial domain
intrusion detection