… We also develop a weaker privacy model where a continuous observer … privacypreserving tag identification scheme that is CCF-checkable and prove it secure under the weaker privacy …
Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Communications …, 2022 - ieeexplore.ieee.org
… • Discuss privacy aspects of the covertcommunication in … privacy issues that may arise from the covertcommunication in … -based covertcommunication can provide privacypreservation …
… Covert channels are secret communication paths, which existance is not expected in the original system design. Covert … resistance, anonimity and privacypreservation to address issues …
… , military operations, and privacypreservation. Moreover, the current … In this paper, we present a systematic covertcommunication … 2, to guarantee the security and privacy of such …
… Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert communication techniques hide the existence of communication and thus achieve security …
Z Liu, J Liu, Y Zeng, J Ma - IEEE Wireless Communications, 2018 - ieeexplore.ieee.org
… In another scenario, covertcommunication can also be used to preserve the location privacy of users. … Practical Privacy Rate: While we can derive the privacy rate of covert wireless …
… privacy disclosure and covertcommunication. In order to make sure secure communications… ], adapting to the covertcommunication and privacypreserving of IoT. Steganalysis network …
L Zhang, Z Zhang, W Wang, Z Jin, Y Su… - IEEE Systems …, 2021 - ieeexplore.ieee.org
… , we propose a covertcommunication model combined with smart contracts to covertly transfer … On the premise of ensuring the privacy of voting, applying this two-round protocol to the …
R Xu, G Li, Z Yang, M Chen, Y Liu… - … Communications and …, 2024 - ieeexplore.ieee.org
… of anti-eavesdropping and privacy reconstruction has not yet been … presents a covert and reliable semantic communication (… for privacypreserving,” IEEE Communications Letters, 2023. …