Results 231 to 240 of about 83,946 (258)
4/4 and more, rhythmic complexity more strongly predicts groove in common meters. [PDF]
Spiech C +3 more
europepmc +1 more source
Activation of the kynurenine pathway identified in individuals with covert hepatic encephalopathy. [PDF]
Zeng G +12 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Optimal Covert Communication Techniques
International Journal of Informatics and Applied Mathematics, 2022Due to advancements in hacking and reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk of being intercepted by an attacker. Covert communication outwits this malicious breach of privacy act better than cryptography as it camouflages secret information inside another innocent looking ...
openaire +2 more sources
Keyless asynchronous covert communication
2016 IEEE Information Theory Workshop (ITW), 2016We consider a scenario in which Alice asynchronously communicates with Bob over a Discrete Memoryless Channel (DMC) while escaping detection from an adversary who observes their communication through another DMC. Specifically, Alice transmits codewords of length n and chooses the transmission epoch T uniformly at random among N available time epochs ...
Keerthi Suria Kumar Arumugam +1 more
openaire +1 more source
Covert Communication With Cognitive Jammer
IEEE Wireless Communications Letters, 2020This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it determines whether to transmit the jamming signal.
Wenhui Xiong +3 more
openaire +1 more source
Covert and Deniable Communications
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their ...
openaire +1 more source
Concurrent Covert Communication Channels
2010This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md Amiruzzaman +3 more
openaire +1 more source
Covert Channel Secure Hypercube Message Communication
Journal of Parallel and Distributed Computing, 1995Abstract The hypercube multiprocessor is a popular architecture in parallel computing environments. Recently, computer security and privacy issues have gained significance. This paper considers the security issues of a network of processors connected over a hypercube topology.
Bhattacharya, Sourav +2 more
openaire +2 more sources
Laser communications for covert links
SPIE Proceedings, 1993An atmospheric lasercom link over a 4 km path has been implemented between The MITRE Corporation and Lahey Clinic, Bedford, MA. This testbed employs emerging 1550 nm laser and receiver technology for greatly enhanced covertness and eye safety compared to current 820 nm technology.
Jerold L. Jaeger, Robert T. Carlson
openaire +1 more source

