Revision of J3Gen and Validity of the Attacks by Peinado et al.
Alberto PeinadoJorge MunillaAmparo Fúster-SabaterPublished in: Sensors (2015)
Keyphrases
- remote user authentication scheme
- malicious users
- countermeasures
- malicious attacks
- smart card
- belief revision
- security risks
- traffic analysis
- watermarking scheme
- security threats
- computer security
- knowledge base
- ieee trans
- social networks
- security mechanisms
- watermarking algorithm
- terrorist attacks
- attack detection
- multiscale