Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icccsec/FangTWPWL20
%A Fang, Yixiang
%A Tu, Kai
%A Wu, Kai
%A Peng, Yi
%A Wang, Junxiang
%A Lu, Changlong
%B ICAIS (2)
%D 2020
%E Sun, Xingming
%E Wang, Jinwei
%E Bertino, Elisa
%I Springer
%K dblp
%P 593-603
%T Securing Data Communication of Internet of Things in 5G Using Network Steganography.
%U http://dblp.uni-trier.de/db/conf/icccsec/icais2020-2.html#FangTWPWL20
%V 12240
%@ 978-3-030-57881-7
@inproceedings{conf/icccsec/FangTWPWL20,
added-at = {2020-09-01T00:00:00.000+0200},
author = {Fang, Yixiang and Tu, Kai and Wu, Kai and Peng, Yi and Wang, Junxiang and Lu, Changlong},
biburl = {https://www.bibsonomy.org/bibtex/2ddc5094a7e5a36589e70b5c1e850e6f6/dblp},
booktitle = {ICAIS (2)},
crossref = {conf/icccsec/2020-2},
editor = {Sun, Xingming and Wang, Jinwei and Bertino, Elisa},
ee = {https://doi.org/10.1007/978-3-030-57881-7_52},
interhash = {a7b2acc6c2626596536ea9e304de59fe},
intrahash = {ddc5094a7e5a36589e70b5c1e850e6f6},
isbn = {978-3-030-57881-7},
keywords = {dblp},
pages = {593-603},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2020-09-09T13:48:41.000+0200},
title = {Securing Data Communication of Internet of Things in 5G Using Network Steganography.},
url = {http://dblp.uni-trier.de/db/conf/icccsec/icais2020-2.html#FangTWPWL20},
volume = 12240,
year = 2020
}