Login / Signup
Reflections on slide with a twist attacks.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Published in:
Des. Codes Cryptogr. (2015)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
security mechanisms
security threats
traffic analysis
terrorist attacks
chosen plaintext
neural network
multiresolution
computer security
cryptographic protocols
malicious users
data corruption
security flaws