The document discusses selective jamming attacks in wireless networks where an adversary targets important messages. It presents three schemes to prevent real-time packet classification and mitigate these attacks: 1) A strong hiding commitment scheme that uses symmetric encryption to hide packet contents, 2) A cryptographic puzzle hiding scheme that requires solving a puzzle to recover encryption keys, 3) Hiding based on all-or-nothing transformations that pre-processes packets to prevent classification until all pseudo-messages are received. The schemes aim to transform selective jamming into random jamming and were evaluated to achieve strong security properties with low overhead.