fig2

Rethinking the adversary and operational characteristics of deniable storage

Figure 2. The information dispersal algorithms available for use with Artifice.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/