Login / Signup
Correlation Attacks on Up/Down Cascades.
Jovan Dj. Golic
Renato Menicocci
Published in:
ACISP (1998)
Keyphrases
</>
countermeasures
malicious attacks
correlation coefficient
computer security
denial of service attacks
website
face recognition
cooperative
watermarking scheme
diffusion process
information diffusion
cyber attacks
java card
security threats