Login / Signup

Superimposing permutational covert channels onto reliable stream protocols.

Jamie LevyJaroslaw PaduchBilal Khan
Published in: MALWARE (2008)
Keyphrases
  • data streams
  • information flow
  • sliding window
  • streaming data
  • stream data
  • communication protocols
  • sensor networks
  • cost effective
  • multi party
  • voting protocols