Searched for: +
(1 - 2 of 2)
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Li, Qianmu (author), Mazurczyk, Wojciech (author), Choo, Kim Kwang Raymond (author), Gupta, Brij B. (author), Conti, M. (author)
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the...
journal article 2022
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Mazurczyk, Wojciech (author), Li, Qianmu (author), Kilger, Max (author), Choo, Kim Kwang Raymond (author), Conti, M. (author)
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for practical scenarios, such as social and political movements in...
journal article 2022