Sciweavers

61 search results - page 2 / 13
» Covert channels and anonymizing networks
Sort
View
CCS
2006
ACM
13 years 9 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
COMSUR
2007
101views more  COMSUR 2007»
13 years 5 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
LCN
2008
IEEE
13 years 11 months ago
Covert channels in multiplayer first person shooter online games
Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
PET
2004
Springer
13 years 10 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
WPES
2003
ACM
13 years 10 months ago
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û Ñ Ø Ó × Ò Ð Ò ÒÓÒÝÑÓÙ× Óѹ ÑÙÒ Ø ÓÒ ÓÒ Ø ÁÒØ ÖÒ Øº Ï × Ö Ò Û ÔÖÓØÓ ÓÐ Ø Ø ÐÐÓÛ× Ù× ØÓ ...
Matthias Bauer