Results 231 to 240 of about 83,946 (258)

Activation of the kynurenine pathway identified in individuals with covert hepatic encephalopathy. [PDF]

open access: yesHepatol Commun
Zeng G   +12 more
europepmc   +1 more source

Optimal Covert Communication Techniques

International Journal of Informatics and Applied Mathematics, 2022
Due to advancements in hacking and reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk of being intercepted by an attacker. Covert communication outwits this malicious breach of privacy act better than cryptography as it camouflages secret information inside another innocent looking ...
openaire   +2 more sources

Keyless asynchronous covert communication

2016 IEEE Information Theory Workshop (ITW), 2016
We consider a scenario in which Alice asynchronously communicates with Bob over a Discrete Memoryless Channel (DMC) while escaping detection from an adversary who observes their communication through another DMC. Specifically, Alice transmits codewords of length n and chooses the transmission epoch T uniformly at random among N available time epochs ...
Keerthi Suria Kumar Arumugam   +1 more
openaire   +1 more source

Covert Communication With Cognitive Jammer

IEEE Wireless Communications Letters, 2020
This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it determines whether to transmit the jamming signal.
Wenhui Xiong   +3 more
openaire   +1 more source

Covert and Deniable Communications

Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their ...
openaire   +1 more source

Concurrent Covert Communication Channels

2010
This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md Amiruzzaman   +3 more
openaire   +1 more source

Covert Channel Secure Hypercube Message Communication

Journal of Parallel and Distributed Computing, 1995
Abstract The hypercube multiprocessor is a popular architecture in parallel computing environments. Recently, computer security and privacy issues have gained significance. This paper considers the security issues of a network of processors connected over a hypercube topology.
Bhattacharya, Sourav   +2 more
openaire   +2 more sources

Laser communications for covert links

SPIE Proceedings, 1993
An atmospheric lasercom link over a 4 km path has been implemented between The MITRE Corporation and Lahey Clinic, Bedford, MA. This testbed employs emerging 1550 nm laser and receiver technology for greatly enhanced covertness and eye safety compared to current 820 nm technology.
Jerold L. Jaeger, Robert T. Carlson
openaire   +1 more source

Home - About - Disclaimer - Privacy