Sciweavers

5 search results - page 1 / 1
» Quantitatively Analyzing Stealthy Communication Channels
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
INFOCOM
2009
IEEE
13 years 11 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
TIFS
2008
145views more  TIFS 2008»
13 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ICC
2007
IEEE
137views Communications» more  ICC 2007»
13 years 11 months ago
Optimality and Complexity of Opportunistic Spectrum Access: A Truncated Markov Decision Process Formulation
— We consider opportunistic spectrum access (OSA) which allows secondary users to identify and exploit instantaneous spectrum opportunities resulting from the bursty traffic of ...
Dejan V. Djonin, Qing Zhao, Vikram Krishnamurthy
GLOBECOM
2008
IEEE
13 years 5 months ago
Uplink Ergodic Mutual Information of OFDMA-Based Two-Hop Cooperative Relay Networks with Imperfect CSI
— This paper analyzes the ergodic mutual information of OFDMA cooperative relay networks when the Channel State Information (CSI) imperfection is considered at resource allocatio...
Mohamad Khattar Awad, Xuemin Shen, Bashar Zogheib