Sciweavers

96 search results - page 9 / 20
» Covert Multi-Party Computation
Sort
View
ROBOCOMM
2007
IEEE
15 years 11 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
INDOCRYPT
2003
Springer
15 years 10 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
COMPSEC
2011
15 years 1 days ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
154
Voted
POPL
2000
ACM
15 years 9 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
RAID
2009
Springer
15 years 11 months ago
Exploiting Temporal Persistence to Detect Covert Botnet Channels
Frédéric Giroire, Jaideep Chandrashe...