Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,951,125 papers from all fields of science
Search
Sign In
Create Free Account
Cover-coding
Cover-coding is a technique for obscuring the data that is transmitted over an insecure link, to reduce the risks of snooping. An example of cover…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Cipher
Exclusive or
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
An Approach towards Efficient and Secure RFID Mutual Authentication Protocol
Lokesh P. Bharule
,
Anjali A. Yadav
2015
Corpus ID: 17456206
The widespread distribution of RFID technologies may generate new threats to user privacy and security. The International…
Expand
2013
2013
ARM and FPGA Implementation of Secured Authentication Protocol for RFID System
S. Mohanavelu
,
T. Ramya
2013
Corpus ID: 67813269
The authentication process of RFID tag's the tag/reader/server communicates over an insecure channel due to weak authentication…
Expand
2012
2012
Efficient Implementation of RFID Mutual Authentication Protocol
Yu-Jung Huang
,
W. Lin
,
Hung-Lin Li
IEEE transactions on industrial electronics…
2012
Corpus ID: 2850239
Researchers have shown that the Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification has serious security…
Expand
2012
2012
A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model
Z. Zhan
,
L. Guangjie
,
Dai Yuewei
,
Wang Zhi-quan
2012
Corpus ID: 215891673
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE