Sciweavers

96 search results - page 9 / 20
» Covert Multi-Party Computation
Sort
View
ROBOCOMM
2007
IEEE
15 years 3 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
INDOCRYPT
2003
Springer
15 years 2 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
COMPSEC
2011
14 years 4 months ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
POPL
2000
ACM
15 years 2 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
50
Voted
RAID
2009
Springer
15 years 4 months ago
Exploiting Temporal Persistence to Detect Covert Botnet Channels
Frédéric Giroire, Jaideep Chandrashe...