Login / Signup
Covert Channels in One-Time Passwords Based on Hash Chains.
Jörg Keller
Steffen Wendzel
Published in:
EICC (2020)
Keyphrases
</>
hash functions
information flow
multi channel
mimo systems
database
information security
b tree
network analysis
locality sensitive
multiscale
website
similarity search
nearest neighbor
fading channels
user authentication
terrorist networks
machine learning
neural network