QL
Qianmu Li
2 records found
1
CovertSYS
A systematic covert communication approach for providing secure end-to-end conversation via social networks
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for prac
...
Modern Authentication Schemes in Smartphones and IoT Devices
An Empirical Survey
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deploy
...