Login / Signup

Generalized MitM attacks on full TWINE.

Mohamed TolbaAmr M. Youssef
Published in: Inf. Process. Lett. (2016)
Keyphrases
  • database systems
  • digital image watermarking
  • data sets
  • information systems
  • multiresolution
  • countermeasures
  • security protocols
  • dos attacks
  • malicious users