A symmetric key distribution protocol utilizing network steganography
This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...
Saved in:
Main Authors: | De La Cerna, Methuselah Galagar, Valera, Luis Angelo De La Cruz, Betito, Bernice Marie Martinez |
---|---|
格式: | text |
語言: | English |
出版: |
Animo Repository
2022
|
主題: | |
在線閱讀: | https://animorepository.dlsu.edu.ph/etdb_comtech/5 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
相似書籍
-
PC-based data steganography for FM radio
由: Chu, Helvin Khen G.C., et al.
出版: (2008) -
Classical and physical security of symmetric key cryptographic algorithms
由: Baksi, Anubhab
出版: (2021) -
Certificateless public key encryption: A new generic construction and two pairing-free schemes
由: Yang, G., et al.
出版: (2014) -
The invisible truth: Secrets behind steganography
由: Quinto, Amando Jose, et al.
出版: (2008) -
Certificateless public key encryption: A new generic construction and two pairing-free schemes
由: YANG, Guomin, et al.
出版: (2011)