Login / Signup
Derailing Attacks (Transcript of Discussion).
Mohammad Torabi Dashti
Published in:
Security Protocols Workshop (2015)
Keyphrases
</>
countermeasures
security mechanisms
malicious attacks
attack detection
database
watermarking scheme
watermarking algorithm
word recognition
security threats
malicious users
privacy preserving
cyber attacks
traffic analysis
data corruption
arabic handwriting recognition