Protocol Proxy: An FTE-based Covert Channel

27 Feb 2020 Oakley Jonathan Yu Lu Zhong Xingsi Venayagamoorthy Ganesh Kumar Brooks Richard

In a hostile network environment, users must communicate without being detected. This involves blending in with the existing traffic... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Categories


  • CRYPTOGRAPHY AND SECURITY