+

Du et al., 2022 - Google Patents

The applications of blockchain in the covert communication

Du et al., 2022

View PDF @Full View
Document ID
14120706508122079958
Author
Du B
He D
Luo M
Peng C
Feng Q
Publication year
Publication venue
Wireless Communications and Mobile Computing

External Links

Snippet

Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
US11880831B2 (en) Encryption system, encryption key wallet and method
Sleiman et al. Bitcoin message: Data insertion on a proof-of-work cryptocurrency system
US8437474B2 (en) Public key encryption for groups
CN111095256A (en) Securely executing intelligent contract operations in a trusted execution environment
Zhang et al. Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions
CN106897879A (en) Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label
Wang et al. Ccbrsn: a system with high embedding capacity for covert communication in bitcoin
Alsalami et al. Uncontrolled randomness in blockchains: Covert bulletin board for illicit activity
Zhang et al. An approach of covert communication based on the Ethereum whisper protocol in blockchain
CN103493428B (en) Data encryption
CN113348455A (en) Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures
CN107612680A (en) A kind of national secret algorithm in mobile network's payment
Du et al. The applications of blockchain in the covert communication
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
CN113761578A (en) Document true checking method based on block chain
Job et al. A modified secure version of the Telegram protocol (MTProto)
Bhandari et al. Enhancement of MD5 Algorithm for Secured Web Development.
Chen et al. Tackling data mining risks: A tripartite covert channel merging blockchain and ipfs
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
Vrana Cyber security and data ownership
Yang et al. Enhanced digital rights management authentication scheme based on smart card
Minaei et al. R3c3: Cryptographically secure censorship resistant rendezvous using cryptocurrencies
Sharma et al. Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms
Yue et al. MBCT: A monero-based covert transmission approach with on-chain dynamic session key negotiation
Alsalami et al. Utilizing public blockchains for censorship-circumvention and IoT communication
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载