Login / Signup
Surviving attacks on disruption-tolerant networks without authentication.
John Burgess
George Dean Bissias
Mark D. Corner
Brian Neil Levine
Published in:
MobiHoc (2007)
Keyphrases
</>
security mechanisms
semi fragile watermarking
network structure
digital watermarking
countermeasures
detect malicious
traffic analysis
social networks
supply chain
computer networks
smart card
denial of service attacks