Results 21 to 30 of about 163,707 (282)

Covert Wireless Communication with a Poisson Field of Interferers [PDF]

open access: yes, 2018
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao   +3 more
core   +5 more sources

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

The cost of space independence in P300-BCI spellers. [PDF]

open access: yes, 2010
Background: Though non-invasive EEG-based Brain Computer Interfaces (BCI) have been researched extensively over the last two decades, most designs require control of spatial attention and/or gaze on the part of the user. Methods: In healthy adults, we
Chennu, Srivas   +4 more
core   +2 more sources

Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection

open access: yesSensors, 2022
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication.
Zeke Wu   +4 more
doaj   +1 more source

Covert Communication in Fading Channels under Channel Uncertainty [PDF]

open access: yes, 2017
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public ...
Shahzad, Khurram   +2 more
core   +2 more sources

Covert Rate Study for Full-Duplex D2D Communications Underlaid Cellular Networks

open access: yesIEEE Internet of Things Journal, 2023
Abstract Device-to-device (D2D) communications underlaid cellular networks have emerged as a promising network architecture to provide extended coverage and high data rate for various Internet of Things (IoT) applications. However, because of the inherent openness and broadcasting nature of wireless communications, such networks face severe risks of ...
Yihuai Yang   +4 more
openaire   +2 more sources

Analysis of Multiple Antenna Covert Communication Technology Assisted by Artificial Noise [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
A multiple antenna covert communication system is considered, which consists of a multi-antenna transmitter, a two-antenna legitimate user and a single-antenna eavesdropping user with power detection function.
GUO Hui, QIAO Ting
doaj   +1 more source

Covert Bits Through Queues

open access: yes, 2016
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core   +1 more source

New security and control protocol for VoIP based on steganography and digital watermarking [PDF]

open access: yes, 2006
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core   +3 more sources

Selective Noise Based Power-Efficient and Effective Countermeasure against Thermal Covert Channel Attacks in Multi-Core Systems

open access: yesJournal of Low Power Electronics and Applications, 2022
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data.
Parisa Rahimi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy