Keyphrases
- countermeasures
- malicious attacks
- security protocols
- watermarking scheme
- security flaws
- trade off
- watermarking algorithm
- greater degree
- malicious users
- differential power analysis
- learning algorithm
- data corruption
- attack detection
- terrorist attacks
- traffic analysis
- security threats
- dos attacks
- computer security
- security mechanisms