fig3

Rethinking the adversary and operational characteristics of deniable storage

Figure 3. The process of locating Artifice superblocks through chain hashing a user’s passphrase.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/