Sciweavers

677 search results - page 13 / 136
» Secure Pseudonymous Channels
Sort
View
CCS
2007
ACM
15 years 3 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
CCS
2004
ACM
15 years 3 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
144
Voted
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 9 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
IFIP
2009
Springer
14 years 7 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
AGENTS
2001
Springer
15 years 2 months ago
Dynamic scheduling of a fixed bandwidth communications channel for controlling multiple robots
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...