Login / Signup

Wiretap-channels under constrained active and passive attacks.

Carsten Rudolf JandaMoritz WieseJanis NötzelHolger BocheEduard A. Jorswieck
Published in: CNS (2015)
Keyphrases
  • countermeasures
  • malicious users
  • multiscale
  • constrained problems
  • malicious attacks
  • data sets
  • search engine
  • email
  • computer security
  • terrorist attacks
  • data corruption