Sciweavers

96 search results - page 9 / 20
» Covert Multi-Party Computation
Sort
View
ROBOCOMM
2007
IEEE
14 years 1 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
INDOCRYPT
2003
Springer
14 years 17 days ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
COMPSEC
2011
13 years 2 months ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
POPL
2000
ACM
13 years 11 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
RAID
2009
Springer
14 years 1 months ago
Exploiting Temporal Persistence to Detect Covert Botnet Channels
Frédéric Giroire, Jaideep Chandrashe...