Du et al., 2022 - Google Patents
The applications of blockchain in the covert communicationDu et al., 2022
View PDF- Document ID
- 14120706508122079958
- Author
- Du B
- He D
- Luo M
- Peng C
- Feng Q
- Publication year
- Publication venue
- Wireless Communications and Mobile Computing
External Links
Snippet
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority …
- 238000004891 communication 0 title abstract description 100
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11880831B2 (en) | Encryption system, encryption key wallet and method | |
| Sleiman et al. | Bitcoin message: Data insertion on a proof-of-work cryptocurrency system | |
| US8437474B2 (en) | Public key encryption for groups | |
| CN111095256A (en) | Securely executing intelligent contract operations in a trusted execution environment | |
| Zhang et al. | Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions | |
| CN106897879A (en) | Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label | |
| Wang et al. | Ccbrsn: a system with high embedding capacity for covert communication in bitcoin | |
| Alsalami et al. | Uncontrolled randomness in blockchains: Covert bulletin board for illicit activity | |
| Zhang et al. | An approach of covert communication based on the Ethereum whisper protocol in blockchain | |
| CN103493428B (en) | Data encryption | |
| CN113348455A (en) | Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures | |
| CN107612680A (en) | A kind of national secret algorithm in mobile network's payment | |
| Du et al. | The applications of blockchain in the covert communication | |
| Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
| CN113761578A (en) | Document true checking method based on block chain | |
| Job et al. | A modified secure version of the Telegram protocol (MTProto) | |
| Bhandari et al. | Enhancement of MD5 Algorithm for Secured Web Development. | |
| Chen et al. | Tackling data mining risks: A tripartite covert channel merging blockchain and ipfs | |
| Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
| Vrana | Cyber security and data ownership | |
| Yang et al. | Enhanced digital rights management authentication scheme based on smart card | |
| Minaei et al. | R3c3: Cryptographically secure censorship resistant rendezvous using cryptocurrencies | |
| Sharma et al. | Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms | |
| Yue et al. | MBCT: A monero-based covert transmission approach with on-chain dynamic session key negotiation | |
| Alsalami et al. | Utilizing public blockchains for censorship-circumvention and IoT communication |