Results 31 to 40 of about 154,545 (256)

On Covert Communication With Noise Uncertainty [PDF]

open access: yesIEEE Communications Letters, 2017
to appear in IEEE Communications ...
Biao He   +3 more
openaire   +3 more sources

Queer cryptograms, anarchist cyphers: decoding Dennis Cooper's The marbled swarm: a novel [PDF]

open access: yes, 2012
Concentrating on Dennis Cooper’s latest work, The Marbled Swarm: A Novel, a fiendishly complex, experimental tale of murder and cannibalism in Cooper’s adopted home city of Paris, I show that both the subject of the text and its formal architecture are ...
Hester, Diarmuid
core   +1 more source

Covert Communication over Adversarially Jammed Channels [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
Suppose that a transmitter Alice potentially wishes to communicate with a receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits based on his observations. We consider a
Qiaosheng Zhang   +2 more
openaire   +2 more sources

Covert Optical Communication

open access: yes, 2014
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Bash, Boulat A.   +6 more
openaire   +2 more sources

Covert communications on renewal packet channels [PDF]

open access: yes2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin   +3 more
openaire   +2 more sources

MRCC: A Practical Covert Channel Over Monero With Provable Security

open access: yesIEEE Access, 2021
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo   +3 more
doaj   +1 more source

Covert Bits Through Queues

open access: yes, 2016
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core   +1 more source

Communication in a Poisson Field of Interferers -- Part II: Channel Capacity and Interference Spectrum [PDF]

open access: yes, 2007
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless ...
Moe Z. Win   +2 more
core   +1 more source

A Covert Channel Over VoLTE via Adjusting Silence Periods

open access: yesIEEE Access, 2018
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt
Xiaosong Zhang   +4 more
doaj   +1 more source

Covert Quantum Internet

open access: yes, 2017
We apply covert quantum communication based on entanglement generated from the Minkowski vacuum to the setting of quantum computation and quantum networks.
Brown, André EX   +11 more
core   +5 more sources

Home - About - Disclaimer - Privacy