Login / Signup
-Permutation Protection Scheme Against Modification Attack.
Wai W. Fung
James W. Gray III
Published in:
ACISP (1999)
Keyphrases
</>
protection scheme
buffer overflow
operating system
multiresolution
data corruption
image coding
signal to noise ratio
secret key
ddos attacks