Login / Signup
A MAC Forgery Attack on SOBER-128.
Dai Watanabe
Soichi Furuya
Toshinobu Kaneko
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2005)
Keyphrases
</>
digital images
countermeasures
attack detection
malicious users
data mining
wireless sensor networks
constraint satisfaction
arc consistency
signature verification
detection mechanism
denial of service attacks
key exchange protocol