Sciweavers

164 search results - page 10 / 33
» Covert two-party computation
Sort
View
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 10 months ago
A computational approach to the covert and overt deployment of spatial attention
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of th...
Jérémy Fix, Nicolas P. Rougier, Fr&e...
IH
2004
Springer
14 years 3 months ago
Covert Channels for Collusion in Online Computer Games
Steven J. Murdoch, Piotr Zielinski
ICON
2007
IEEE
14 years 4 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
ROBOCOMM
2007
IEEE
14 years 4 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
COMPSEC
2011
13 years 4 months ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...