Login / Signup
On the performance of using Covert Timing Channels for node authentication.
Reed Newman
Raheem A. Beyah
Published in:
Secur. Commun. Networks (2009)
Keyphrases
</>
information flow
tree structure
multi channel
graph structure
image authentication
biometric authentication
information systems
data sets
social networks
identity management
identity authentication
authentication mechanism
fragile watermarking