Gimenez-Aguilar et al., 2021 - Google Patents
Zephyrus: An information hiding mechanism leveraging Ethereum data fieldsGimenez-Aguilar et al., 2021
View PDF- Document ID
- 7587637812253432108
- Author
- Gimenez-Aguilar M
- De Fuentes J
- González-Manzano L
- Camara C
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin. However, Ethereum cryptocurrency is gaining momentum as a …
- 238000005065 mining 0 abstract description 10
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Thabit et al. | A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing | |
| CN108885741B (en) | Tokenization method and system for realizing exchange on block chain | |
| US11979492B2 (en) | Computer-implemented system and method for distributing shares of digitally signed data | |
| US11880831B2 (en) | Encryption system, encryption key wallet and method | |
| Gimenez-Aguilar et al. | Zephyrus: An information hiding mechanism leveraging Ethereum data fields | |
| JP2022528925A (en) | Computer-implemented methods and systems for encrypting data | |
| CN113435888A (en) | Account data processing method, device, equipment and storage medium | |
| Kaushik et al. | Secure cloud data using hybrid cryptographic scheme | |
| Sharma et al. | Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms | |
| Hossain et al. | A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application | |
| Ghosh et al. | A variable length key based cryptographic approach on cloud data | |
| Du et al. | The applications of blockchain in the covert communication | |
| shaher Alslman et al. | Exchanging digital documents using blockchain technology | |
| Bokhari et al. | Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher | |
| Yue et al. | MBCT: A monero-based covert transmission approach with on-chain dynamic session key negotiation | |
| Ullah et al. | Enhanced RSA Algorithm for Data Security in the Internet of Things | |
| Anbazhagan et al. | Cloud Computing Security Through Symmetric Cipher Model | |
| Saraf et al. | Parallel algorithm for finding inverse of a matrix and its application in message sharing (coding theory) | |
| Vegh et al. | A new approach towards increased security in cyber-physical systems | |
| Sharma et al. | A case of multilevel security application for ensuring data integrity (prevention and detection) in cloud environment | |
| Chen et al. | Design and Performance of Privacy Protection Model for Big Data Transmission Based on Mixed Encryption | |
| Prakash et al. | Encryption and decryption framework using elliptic curve cryptography | |
| Manjula et al. | Cryptography and Adversarial Analysis for Cloud Data Security | |
| Joshi et al. | Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts | |
| Lang et al. | A covert communication model of Ethereum based on smart contracts |