Login / Signup
Generalized MitM attacks on full TWINE.
Mohamed Tolba
Amr M. Youssef
Published in:
Inf. Process. Lett. (2016)
Keyphrases
</>
database systems
digital image watermarking
data sets
information systems
multiresolution
countermeasures
security protocols
dos attacks
malicious users