Back to Results
First PageMeta Content
Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token


Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye
Add to Reading List

Document Date: 2013-03-04 21:29:09


Open Document

File Size: 182,25 KB

Share Result on Facebook