Results 31 to 40 of about 72,081 (273)
This paper studies multi‐antenna covert communication exploiting a public communication link over the wireless fading channel. In particular, a relatively practical covert communication scenario is considered for the first time, where a warden with ...
Yuda Lin +3 more
doaj +1 more source
MRCC: A Practical Covert Channel Over Monero With Provable Security
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo +3 more
doaj +1 more source
Covert channel detection using Information Theory
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core +3 more sources
Covert communications with channel inversion power control in uplink NOMA systems
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang +5 more
doaj +1 more source
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
Covert Capacity of Bosonic Channels [PDF]
More details on Lemma 1. Other minor changes.
Christos N. Gagatsos +2 more
openaire +2 more sources
Mechanisms of parasite‐mediated disruption of brain vessels
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira +3 more
wiley +1 more source
Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol [PDF]
Aiming at the problem that the construction method of covert channel under traditional Internet of Vehicles protocol is single and cannot be applied to complex network environment,a construction method of covert channel in Internet of Vehicles based on ...
ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili
doaj +1 more source
A generalized approach to estimation of memoryless covert channel information leakage capacity
Estimating the amount of information that is leaked by covert channels is a necessity to comprehend and mitigate the severity of attacks exploiting these channels.
Baki Berkay Yilmaz +5 more
doaj +1 more source
A Covert Queueing Channel in FCFS Schedulers
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users.
Ghassami, AmirEmad, Kiyavash, Negar
core +1 more source

