Sciweavers

164 search results - page 11 / 33
» Covert two-party computation
Sort
View
POPL
2000
ACM
14 years 2 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
TIFS
2008
154views more  TIFS 2008»
13 years 9 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
RAID
2009
Springer
14 years 4 months ago
Exploiting Temporal Persistence to Detect Covert Botnet Channels
Frédéric Giroire, Jaideep Chandrashe...
NDSS
1997
IEEE
14 years 2 months ago
Experimental Results of Covert Channel Limitation in One-Way Communication Systems
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppe...
ICDCSW
2005
IEEE
14 years 3 months ago
Capacity Estimation of Non-Synchronous Covert Channels
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Zhenghong Wang, Ruby B. Lee