Login / Signup
Secure Estimation Under Causative Attacks.
Saurabh Sihag
Ali Tajer
Published in:
IEEE Trans. Inf. Theory (2020)
Keyphrases
</>
secure routing
security mechanisms
security protocols
stream cipher
cryptographic protocols
security flaws
chosen plaintext
security measures
countermeasures
accurate estimation
estimation accuracy
user authentication
web applications
estimation algorithm
authentication scheme
remote user authentication scheme