Abstract | ||
---|---|---|
Widely deployed encryption-based security prevents unauthorized decoding, but does not ensure undetectability of communication. However, covert, or low probability of detection/intercept communication is crucial in many scenarios ranging from covert military operations and the organization of social unrest, to privacy protection for users of wireless networks. In addition, encrypted data or even j... |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/MCOM.2015.7355562 | IEEE Communications Magazine |
Keywords | Field | DocType |
OFDM,Cryptography,Physical layer,Spread spectrum communication,Wireless networks,Time-frequency analysis,Network security | Wireless network,Steganography,Wireless,Computer science,Cryptography,Computer security,Covert,Computer network,Encryption,Adversary,Spread spectrum | Journal |
Volume | Issue | ISSN |
53 | 12 | 0163-6804 |
Citations | PageRank | References |
35 | 1.13 | 12 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Boulat A. Bash | 1 | 320 | 18.25 |
Dennis Goeckel | 2 | 1060 | 69.96 |
Don Towsley | 3 | 18693 | 1951.05 |
Saikat Guha | 4 | 1546 | 116.91 |