Results 31 to 40 of about 154,545 (256)
On Covert Communication With Noise Uncertainty [PDF]
to appear in IEEE Communications ...
Biao He +3 more
openaire +3 more sources
Queer cryptograms, anarchist cyphers: decoding Dennis Cooper's The marbled swarm: a novel [PDF]
Concentrating on Dennis Cooper’s latest work, The Marbled Swarm: A Novel, a fiendishly complex, experimental tale of murder and cannibalism in Cooper’s adopted home city of Paris, I show that both the subject of the text and its formal architecture are ...
Hester, Diarmuid
core +1 more source
Covert Communication over Adversarially Jammed Channels [PDF]
Suppose that a transmitter Alice potentially wishes to communicate with a receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits based on his observations. We consider a
Qiaosheng Zhang +2 more
openaire +2 more sources
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Bash, Boulat A. +6 more
openaire +2 more sources
Covert communications on renewal packet channels [PDF]
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin +3 more
openaire +2 more sources
MRCC: A Practical Covert Channel Over Monero With Provable Security
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo +3 more
doaj +1 more source
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core +1 more source
Communication in a Poisson Field of Interferers -- Part II: Channel Capacity and Interference Spectrum [PDF]
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless ...
Moe Z. Win +2 more
core +1 more source
A Covert Channel Over VoLTE via Adjusting Silence Periods
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt
Xiaosong Zhang +4 more
doaj +1 more source
We apply covert quantum communication based on entanglement generated from the Minkowski vacuum to the setting of quantum computation and quantum networks.
Brown, André EX +11 more
core +5 more sources

