Attacks on the DECT Authentication Mechanisms.
Stefan LucksAndreas SchulerErik TewsRalf-Philipp WeinmannMatthias WenzelPublished in: CT-RSA (2009)
Keyphrases
- security mechanisms
- resource constrained
- security threats
- access control
- security issues
- security services
- semi fragile watermarking
- security protocols
- digital watermarking
- security systems
- countermeasures
- smart card
- operating system
- security requirements
- detect malicious
- defense mechanisms
- watermarking scheme
- authentication protocol
- personal information
- image authentication
- fragile watermarking