Sciweavers

677 search results - page 14 / 136
» Secure Pseudonymous Channels
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
ACISP
2007
Springer
15 years 3 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
82
Voted
JNW
2006
85views more  JNW 2006»
14 years 9 months ago
Threats and Countermeasures in GSM Networks
Valer Bocan, Vladimir Cretu
ICASSP
2011
IEEE
14 years 1 months ago
Secrecy capacity and secure outage performance for rayleigh fading simo channel
In this paper, we consider the problem of secret communication through Rayleigh fading single-input multiple-output (SIMO) broadcast channel in the presence of an eavesdropper. At...
Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah
95
Voted
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 1 days ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan