Results 31 to 40 of about 72,081 (273)

Multi‐antenna joint covert communication with a public communication link over wireless fading channel

open access: yesIET Communications, 2021
This paper studies multi‐antenna covert communication exploiting a public communication link over the wireless fading channel. In particular, a relatively practical covert communication scenario is considered for the first time, where a warden with ...
Yuda Lin   +3 more
doaj   +1 more source

MRCC: A Practical Covert Channel Over Monero With Provable Security

open access: yesIEEE Access, 2021
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo   +3 more
doaj   +1 more source

Covert channel detection using Information Theory

open access: yes, 2010
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core   +3 more sources

Covert communications with channel inversion power control in uplink NOMA systems

open access: yesElectronics Letters, 2021
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang   +5 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Covert Capacity of Bosonic Channels [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2020
More details on Lemma 1. Other minor changes.
Christos N. Gagatsos   +2 more
openaire   +2 more sources

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol [PDF]

open access: yesJisuanji kexue
Aiming at the problem that the construction method of covert channel under traditional Internet of Vehicles protocol is single and cannot be applied to complex network environment,a construction method of covert channel in Internet of Vehicles based on ...
ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili
doaj   +1 more source

A generalized approach to estimation of memoryless covert channel information leakage capacity

open access: yesArray, 2022
Estimating the amount of information that is leaked by covert channels is a necessity to comprehend and mitigate the severity of attacks exploiting these channels.
Baki Berkay Yilmaz   +5 more
doaj   +1 more source

A Covert Queueing Channel in FCFS Schedulers

open access: yes, 2018
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users.
Ghassami, AmirEmad, Kiyavash, Negar
core   +1 more source

Home - About - Disclaimer - Privacy