Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions.
Moslem ForouzeshFarid Samsami KhodadadPaeiz AzmiAli KuhestaniHossein AhmadiPublished in: IEEE Internet Things J. (2023)
Keyphrases
- secure routing
- security mechanisms
- cryptographic protocols
- chosen plaintext
- security protocols
- stream cipher
- countermeasures
- real world
- information flow
- security measures
- cryptographic algorithms
- security flaws
- public key
- security issues
- computer security
- security analysis
- authentication scheme
- security management
- sql injection
- social networks