Cited By
View all- Singh JDhurandher SKumar VWoungang IBarolli L(2024)Survey on securing wireless networks through a blockchain-based frameworkJournal of High Speed Networks10.3233/JHS-24007530:4(657-677)Online publication date: 15-Oct-2024
- Keller JHeßeling CWendzel S(2024)Robust and Homomorphic Covert Channels in Streams of Numeric DataProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670879(1-4)Online publication date: 30-Jul-2024
- Heßeling CKeller JLitzinger S(2022)Network Steganography Through Redundancy in Higher-Radix Floating-Point RepresentationsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544429(1-7)Online publication date: 23-Aug-2022
- Show More Cited By