Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

泛在网络环境下隐蔽通道关键技术研究综述

李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …

ZM-CTC: Covert timing channel construction method based on zigzag matrix

J Zheng, S Li, S Hao, Y Li, Y Zhang - Computer Communications, 2022 - Elsevier
Abstract VoLTE (Voice over Long-Term Evolution) is a widely used, high-performance, and
end-to-end transmission solution in 4G and 5G. However, it also provides a new foundation …

Development of video encryption scheme based on quantum controlled dense coding using GHZ state for smart home scenario

H Ma, Y Ma, W Zhang, X Zhao, P Chu - Wireless Personal …, 2022 - Springer
The smart home has security problems such as information leakage during file transmission,
beyond the classical cryptographic scheme, quantum cryptography provides new solutions …

Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning

O Joseph, A Elmalech, C Hajaj - Electronics, 2023 - mdpi.com
Covert communication channels are a concept in which a policy-breaking method is used in
order to covertly transmit data from inside an organization to an external or accessible point …

A reliable peer-to-peer streaming protocol in low-capacity networks

OE Ojo, AO Oluwatope, SO Ajadi - Peer-to-Peer Networking and …, 2021 - Springer
The recent global demand for video streaming applications has paved the way for peer-to-
peer streaming system (P2PSS). Strategic scheduling scheme and dynamic overlay …

Stability detection method of large-scale network information transmission based on digital twin technology

X Lin, J Du, W Gao, A Zhou - International Journal of …, 2024 - inderscienceonline.com
In order to overcome the problems of low accuracy of transmission channel state estimation,
low detection accuracy and long detection task completion time in traditional transmission …

Network covert channel data security detection method based on threshold re-encryption

Y Li, J Sha - International Journal of Information and …, 2023 - inderscienceonline.com
In order to solve the problems of long detection time and high detection error existing in
traditional methods, this paper proposes a data security detection method of network covert …

[PDF][PDF] Oluwafolake E. Ojo, Ayodeji

O Oluwatope, SO Ajadi - academia.edu
The recent global demand for video streaming applications has paved the way for peer-to-
peer streaming system (P2PSS). Strategic scheduling scheme and dynamic overlay …

Logistics management data security transmission system based on Internet of things technology

Z Yang - … Conference on Intelligent Transportation, Big Data & …, 2021 - ieeexplore.ieee.org
The logistics management of colleges and universities involves all aspects of basic data,
with a large amount of data and many kinds. The traditional data analysis and statistics …