Results 241 to 250 of about 83,946 (258)
Some of the next articles are maybe not open access.

Towards Adaptive Covert Communication System

2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of information technology.
Fedor V. Yarochkin   +4 more
openaire   +1 more source

Exact Throughput-Covertness Relation for Covert Communications

GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022
Daizhong Yu   +3 more
openaire   +1 more source

Detecting covert communication on Android

37th Annual IEEE Conference on Local Computer Networks, 2012
Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen   +2 more
openaire   +1 more source

Jamming Strategies in Covert Communication

2019
Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel, Asaf Cohen, Omer Gurewitz
openaire   +1 more source

Covert computer and network communications

Proceedings of the 4th annual conference on Information security curriculum development, 2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire   +1 more source

Physical Layer Covert Communications

2023
Yulong Shen   +2 more
openaire   +1 more source

Covert Communications: A Comprehensive Survey

IEEE Communications Surveys & Tutorials, 2023
Xinying Chen   +6 more
openaire   +2 more sources

Intelligent covert communication

China Communications
Zan, Li   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy