Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Tzung-Her ChenWei-Bin LeeHsing-Bai ChenChien-Lung WangPublished in: Symmetry (2021)
Keyphrases
- security problems
- key management
- security issues
- physical layer
- security requirements
- cloud computing
- security mechanisms
- management system
- information security
- access control
- intrusion detection
- multi channel
- network security
- security threats
- computer security
- cyber security
- security level
- functional requirements
- computer networks
- security systems
- multiple access
- statistical databases
- security measures
- rfid systems
- cyber attacks
- channel coding
- security protocols
- data integrity
- encryption scheme
- sensitive data
- mobile computing
- security policies