A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Network-Hiding Communication and Applications to Multi-party Protocols
[chapter]
2016
Lecture Notes in Computer Science
In a multi-party computation (in short, MPC) protocol over an incomplete network, such a challenge is to hide, to the extent possible, the topology of the underlying communication network. ...
[ITCS 2015] and by Moran et al. [TCC 2015], existing MPC protocols do not hide the topology of the underlying communication network. ...
At a very high level, [MOR15] uses public-key encryption and (semi-honest) multi-party computation to implement a proof-of-concept network-hiding communication protocol, which emulates a complete network ...
doi:10.1007/978-3-662-53008-5_12
fatcat:kbox7z42wvfohbzgl5sxiqprji
Covert voice over internet protocol communications based on spatial model
2015
Science China Technological Sciences
Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. ...
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels ...
There have been some attempts to develop network protocols-and/or VoIP-based steganographic algorithms. ...
doi:10.1007/s11431-015-5955-4
fatcat:xwkuvn4fv5h4nbuiukmqwn3qm4
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
2013
IOSR Journal of Computer Engineering
However, intruders with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. ...
We analyze the security of the proposed methods and evaluate their computational and communication overhead. ...
SS techniques provide bit-level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. ...
doi:10.9790/0661-1514245
fatcat:jmhdzlczf5chbckeebm7uzq4sq
Topology-Hiding Broadcast Based on NTRUEncrypt
2016
KSII Transactions on Internet and Information Systems
Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal. ...
Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted. ...
Albeit secure multi-party computations are usually carried out on computer networks, one important question is always neglected: MPC over an underlying communication network whose structure might be, in ...
doi:10.3837/tiis.2016.01.025
fatcat:iwckvyzrjvbf5bi6g4qcps5vzi
The Research on Hopping Covert Channel Technique Based on Multi-protocol
2016
DEStech Transactions on Engineering and Technology Research
hopping covert channel technique based on multi-protocol is presented in this paper. ...
By using non-normal channel to transfer the information, the covert channel brings great threats to network security on the one hand, but it provides an effective mechanism to transfer secret information ...
Common network covert channels are built on the TCP/IP application layer, and the protocols that could be used to construct covert channel in this layer are many such as, Hypertext Transfer Protocol (HTTP ...
doi:10.12783/dtetr/icmite20162016/4602
fatcat:354asdb3ibdq5m35moibx2j2qq
Is Cloud Computing Steganography-proof?
[article]
2011
arXiv
pre-print
After general introduction to cloud computing and its security we move to brief description of steganography. ...
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. ...
Providing secure multi-tenant environment (secure and
move to brief description of steganography. ...
arXiv:1107.4077v1
fatcat:rg4brc6jqra3bgxxmesmwmhake
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
[article]
2014
arXiv
pre-print
This paper provides an introduction to network steganography and highlights its potential application for harmful purposes. ...
We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems. ...
For instance, if a network steganographic communication got detected and the administrator blocks the utilized communication it can automatically switch to another hiding method or another network protocol ...
arXiv:1407.2029v1
fatcat:5lxmcprh6zf4fd6a5csuqv53oq
Protection of mobile agent and its itinerary from malicious host
2011
2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)
To overcome the mobile agent attack a multi signcryption protocol scheme is being adapted to protect data integrity, data confidentiality and user authentications. ...
Also the Multi Signcryption protocol schemes hides the route used by the mobile agent is being encrypted which is known by only the mobile agent owner alone. ...
For multi key of the protected subscriber agent to sign the message users, SL multi signcryption protocol scheme was and the receiver uses the subscriber agent universal proposed by Seo and Lee in 2004 ...
doi:10.1109/iccct.2011.6075189
fatcat:gtgmm6krrreynibh55ndtyexmi
The Multimedia Reference Model: A Framework Facilitating the Creation of Multi-User, Multimedia Applications
[chapter]
1997
Intelligent Networks and Intelligence in Networks
This service control reference model introduces application building blocks that facilitate application creation and management in all kinds of multi-user, multi-point and multi-channel environments in ...
The advent of digital compressed video and fibre optic communication has opened up new avenues for advanced multimedia applications and services 1 . ...
The applications can be developed using an Application Programming Interface (API) which hides the details of the underlying physical networks. ...
doi:10.1007/978-0-387-35066-0_21
fatcat:6p6aq3hhhzek3kva4idbyinqq4
Jamming Attack Detection and Evaluating Using Wireless Application
2015
International Journal on Recent and Innovation Trends in Computing and Communication
When data is transferred from one host to another host,attacker may try to attack the packet or data which is in transit.Inorder to avoid such kind of attack in time critical wireless application and delivery ...
In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks.To measure network performance ,packet loss and throughput metrics are used . ...
STRONG HIDING COMMITMENT SCHEME (SHCS): We propose a strong hiding commitment scheme (SHCS), which provides strong hiding property while keeping the computation and communication overhead to a minimum.This ...
doi:10.17762/ijritcc2321-8169.150386
fatcat:7tcqay4jvjckliraty2ne3ezzy
Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems
2021
Electronics
The network data were collected thanks to the development of a dedicated application that automatically generates random network configurations and runs scenarios of information hiding techniques. ...
The presented results show the usefulness and correctness of the design process to detect information hiding techniques. ...
Acknowledgments: The authors wish to thank Monika Stępkowska, for her contribution to setting up the experiments.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics10212711
fatcat:y2kl5mrsprb4xoa7gms6ok7p6m
Quantum Communication Networks and Trust Management: A Survey
2019
Computers Materials & Continua
To promote the practical application of quantum communication and network, security is an urgent problem to be solved. ...
The application of quantum communication theory and technology cannot be separated from the quantum communication network. ...
communication network To make quantum communication and quantum communication network practical, to expand the application and improve the distance of quantum communication, it is urgent to establish ...
doi:10.32604/cmc.2019.05668
fatcat:74ltvvnre5bhzpsim3vdpebo4a
How Hidden Can Be Even More Hidden?
[article]
2011
arXiv
pre-print
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction ...
To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram ...
MULTI-LEVEL STEGANOGRAPHY (MLS) Multi-Level Steganography is a new concept of information hiding in telecommunication networks that was introduced to network steganography by Frączek, Mazurczyk and Szczypiorski ...
arXiv:1107.4065v1
fatcat:ozlgnqdouzc2vcxnistlpr4xv4
Steganography and Steganalysis in Voice over IP: A Review
2021
Sensors
data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. ...
It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. ...
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. ...
doi:10.3390/s21041032
pmid:33546240
pmcid:PMC7913304
fatcat:6b5ocz5rajhzzooh345couyjaq
Filtering for Private Collaborative Benchmarking
[chapter]
2006
Lecture Notes in Computer Science
Secure Multi-Party Computation can offer protocols that can compute benchmarks without leaking the input variables. ...
As building blocks we present the fastest implementation of Yao's millionaires' protocol and a protocol that achieves a fair shuffle in O(log n) rounds. ...
The protocol is multi-party and each party holds one input value to the computation. ...
doi:10.1007/11766155_29
fatcat:jhso5eqnq5abrmrs5dwxdny6sq
« Previous
Showing results 1 — 15 out of 20,922 results