Keyphrases
- brute force
- mobile phone
- mobile devices
- exhaustive search
- smart phones
- countermeasures
- computationally expensive
- search quality
- locality sensitive hashing
- security protocols
- computer chess
- malicious users
- malicious attacks
- traffic analysis
- candidate set
- mobile applications
- denial of service attacks
- security mechanisms
- security threats
- watermarking scheme
- terrorist attacks
- daily life
- augmented reality
- mathematical model
- neural network
- desktop computers
- watermarking algorithm