Results 21 to 30 of about 163,707 (282)
Covert Wireless Communication with a Poisson Field of Interferers [PDF]
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao +3 more
core +5 more sources
SecMon: End-to-End Quality and Security Monitoring System [PDF]
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz +5 more
core +4 more sources
The cost of space independence in P300-BCI spellers. [PDF]
Background: Though non-invasive EEG-based Brain Computer Interfaces (BCI) have been researched extensively over the last two decades, most designs require control of spatial attention and/or gaze on the part of the user. Methods: In healthy adults, we
Chennu, Srivas +4 more
core +2 more sources
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication.
Zeke Wu +4 more
doaj +1 more source
Covert Communication in Fading Channels under Channel Uncertainty [PDF]
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public ...
Shahzad, Khurram +2 more
core +2 more sources
Covert Rate Study for Full-Duplex D2D Communications Underlaid Cellular Networks
Abstract Device-to-device (D2D) communications underlaid cellular networks have emerged as a promising network architecture to provide extended coverage and high data rate for various Internet of Things (IoT) applications. However, because of the inherent openness and broadcasting nature of wireless communications, such networks face severe risks of ...
Yihuai Yang +4 more
openaire +2 more sources
Analysis of Multiple Antenna Covert Communication Technology Assisted by Artificial Noise [PDF]
A multiple antenna covert communication system is considered, which consists of a multi-antenna transmitter, a two-antenna legitimate user and a single-antenna eavesdropping user with power detection function.
GUO Hui, QIAO Ting
doaj +1 more source
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core +1 more source
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data.
Parisa Rahimi +2 more
doaj +1 more source

