Login / Signup
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication.
Jinghui Peng
Shanyu Tang
Published in:
IEEE Trans. Ind. Electron. (2021)
Keyphrases
</>
key distribution
streaming media
key management
fault tolerant
authentication protocol
resource constrained
secret key
signature scheme
communication systems
wireless sensor networks
network bandwidth
quality of service
smart card
communication networks
resource constraints
network management