A symmetric key distribution protocol utilizing network steganography
This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...
Saved in:
Main Authors: | , , |
---|---|
格式: | text |
語言: | English |
出版: |
Animo Repository
2022
|
主題: | |
在線閱讀: | https://animorepository.dlsu.edu.ph/etdb_comtech/5 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|