Login / Signup

-Permutation Protection Scheme Against Modification Attack.

Wai W. FungJames W. Gray III
Published in: ACISP (1999)
Keyphrases
  • protection scheme
  • buffer overflow
  • operating system
  • multiresolution
  • data corruption
  • image coding
  • signal to noise ratio
  • secret key
  • ddos attacks