Network covert channel data security detection method based on threshold re-encryption.
Yuanyuan LiJidong ShaPublished in: Int. J. Inf. Commun. Technol. (2023)
Keyphrases
- detection method
- data security
- encryption decryption
- access control
- data confidentiality
- detection algorithm
- covert channel
- computer networks
- data centric
- data integrity
- data management
- network traffic
- security requirements
- data privacy
- network structure
- wireless sensor networks
- databases
- data storage
- distributed databases