Sciweavers

96 search results - page 12 / 20
» Covert Multi-Party Computation
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
ICICS
2004
Springer
14 years 22 days ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
TABLETOP
2008
IEEE
14 years 1 months ago
Pokey: Interaction through covert structured light
In this paper we describe a method to support interaction with a cellphone based projectorcamera system. We describe a novel approach that uses a technique known in Computer Visio...
Christopher Richard Wren, Yuri A. Ivanov, Paul A. ...
PET
2007
Springer
14 years 1 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
CMMR
2007
Springer
161views Music» more  CMMR 2007»
14 years 1 months ago
NN Music: Improvising with a 'Living' Computer
A live algorithm describes an ideal autonomous performance system able to engage in performance with abilities analogous, if not identical, to a human musician. This paper proposes...
Michael Young