|
Volumn , Issue , 2012, Pages 428-438
|
How secure are power network signature based time stamps?
|
Author keywords
Digital recording authentication; Electrical network frequency; Game theory; Information forensics; Time stamp
|
Indexed keywords
COMPUTER-TO-COMPUTER COMMUNICATION;
DETECTION METHODS;
DIGITAL AUDIO;
DIGITAL RECORDING;
ELECTRICAL NETWORKS;
EVOLUTIONARY PERSPECTIVE;
FORENSIC ANALYST;
HOST SIGNALS;
INFORMATION FORENSICS;
POWER NETWORKS;
TIME STAMPS;
ELECTRIC NETWORK ANALYSIS;
GAME THEORY;
VIDEO RECORDING;
SECURITY OF DATA;
|
EID: 84869407144
PISSN: 15437221
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/2382196.2382243 Document Type: Conference Paper |
Times cited : (19)
|
References (12)
|