A symmetric key distribution protocol utilizing network steganography

This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...

全面介紹

Saved in:
書目詳細資料
Main Authors: De La Cerna, Methuselah Galagar, Valera, Luis Angelo De La Cruz, Betito, Bernice Marie Martinez
格式: text
語言:English
出版: Animo Repository 2022
主題:
在線閱讀:https://animorepository.dlsu.edu.ph/etdb_comtech/5
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!

相似書籍