Filters








20,922 Hits in 6.2 sec

Network-Hiding Communication and Applications to Multi-party Protocols [chapter]

Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2016 Lecture Notes in Computer Science  
In a multi-party computation (in short, MPC) protocol over an incomplete network, such a challenge is to hide, to the extent possible, the topology of the underlying communication network.  ...  [ITCS 2015] and by Moran et al. [TCC 2015], existing MPC protocols do not hide the topology of the underlying communication network.  ...  At a very high level, [MOR15] uses public-key encryption and (semi-honest) multi-party computation to implement a proof-of-concept network-hiding communication protocol, which emulates a complete network  ... 
doi:10.1007/978-3-662-53008-5_12 fatcat:kbox7z42wvfohbzgl5sxiqprji

Covert voice over internet protocol communications based on spatial model

YongFeng Huang, ShanYu Tang
2015 Science China Technological Sciences  
Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications.  ...  This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels  ...  There have been some attempts to develop network protocols-and/or VoIP-based steganographic algorithms.  ... 
doi:10.1007/s11431-015-5955-4 fatcat:xwkuvn4fv5h4nbuiukmqwn3qm4

Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

2013 IOSR Journal of Computer Engineering  
However, intruders with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.  ...  We analyze the security of the proposed methods and evaluate their computational and communication overhead.  ...  SS techniques provide bit-level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties.  ... 
doi:10.9790/0661-1514245 fatcat:jmhdzlczf5chbckeebm7uzq4sq

Topology-Hiding Broadcast Based on NTRUEncrypt

2016 KSII Transactions on Internet and Information Systems  
Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal.  ...  Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted.  ...  Albeit secure multi-party computations are usually carried out on computer networks, one important question is always neglected: MPC over an underlying communication network whose structure might be, in  ... 
doi:10.3837/tiis.2016.01.025 fatcat:iwckvyzrjvbf5bi6g4qcps5vzi

The Research on Hopping Covert Channel Technique Based on Multi-protocol

Xie Hui, Han Qingde
2016 DEStech Transactions on Engineering and Technology Research  
hopping covert channel technique based on multi-protocol is presented in this paper.  ...  By using non-normal channel to transfer the information, the covert channel brings great threats to network security on the one hand, but it provides an effective mechanism to transfer secret information  ...  Common network covert channels are built on the TCP/IP application layer, and the protocols that could be used to construct covert channel in this layer are many such as, Hypertext Transfer Protocol (HTTP  ... 
doi:10.12783/dtetr/icmite20162016/4602 fatcat:354asdb3ibdq5m35moibx2j2qq

Is Cloud Computing Steganography-proof? [article]

Wojciech Mazurczyk, Krzysztof Szczypiorski
2011 arXiv   pre-print
After general introduction to cloud computing and its security we move to brief description of steganography.  ...  The paper focuses on characterisation of information hiding possibilities in Cloud Computing.  ...  Providing secure multi-tenant environment (secure and move to brief description of steganography.  ... 
arXiv:1107.4077v1 fatcat:rg4brc6jqra3bgxxmesmwmhake

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [article]

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier
2014 arXiv   pre-print
This paper provides an introduction to network steganography and highlights its potential application for harmful purposes.  ...  We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.  ...  For instance, if a network steganographic communication got detected and the administrator blocks the utilized communication it can automatically switch to another hiding method or another network protocol  ... 
arXiv:1407.2029v1 fatcat:5lxmcprh6zf4fd6a5csuqv53oq

Protection of mobile agent and its itinerary from malicious host

Shashank Srivastava, G. C Nandi
2011 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)  
To overcome the mobile agent attack a multi signcryption protocol scheme is being adapted to protect data integrity, data confidentiality and user authentications.  ...  Also the Multi Signcryption protocol schemes hides the route used by the mobile agent is being encrypted which is known by only the mobile agent owner alone.  ...  For multi key of the protected subscriber agent to sign the message users, SL multi signcryption protocol scheme was and the receiver uses the subscriber agent universal proposed by Seo and Lee in 2004  ... 
doi:10.1109/iccct.2011.6075189 fatcat:gtgmm6krrreynibh55ndtyexmi

The Multimedia Reference Model: A Framework Facilitating the Creation of Multi-User, Multimedia Applications [chapter]

Stephan Abramowski, Karin Klabunde, Ursula Konrads, Karl Neunast, Hermann Tjabben
1997 Intelligent Networks and Intelligence in Networks  
This service control reference model introduces application building blocks that facilitate application creation and management in all kinds of multi-user, multi-point and multi-channel environments in  ...  The advent of digital compressed video and fibre optic communication has opened up new avenues for advanced multimedia applications and services 1 .  ...  The applications can be developed using an Application Programming Interface (API) which hides the details of the underlying physical networks.  ... 
doi:10.1007/978-0-387-35066-0_21 fatcat:6p6aq3hhhzek3kva4idbyinqq4

Jamming Attack Detection and Evaluating Using Wireless Application

Sivagami S
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
When data is transferred from one host to another host,attacker may try to attack the packet or data which is in transit.Inorder to avoid such kind of attack in time critical wireless application and delivery  ...  In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks.To measure network performance ,packet loss and throughput metrics are used .  ...  STRONG HIDING COMMITMENT SCHEME (SHCS): We propose a strong hiding commitment scheme (SHCS), which provides strong hiding property while keeping the computation and communication overhead to a minimum.This  ... 
doi:10.17762/ijritcc2321-8169.150386 fatcat:7tcqay4jvjckliraty2ne3ezzy

Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems

Jędrzej Bieniasz, Krzysztof Szczypiorski
2021 Electronics  
The network data were collected thanks to the development of a dedicated application that automatically generates random network configurations and runs scenarios of information hiding techniques.  ...  The presented results show the usefulness and correctness of the design process to detect information hiding techniques.  ...  Acknowledgments: The authors wish to thank Monika Stępkowska, for her contribution to setting up the experiments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212711 fatcat:y2kl5mrsprb4xoa7gms6ok7p6m

Quantum Communication Networks and Trust Management: A Survey

Shibin Zhang, Yan Chang, Lili Yan, Zhiwei Sheng, Fan Yang, Guihua Han, Yuanyuan Huang, Jinyue Xia
2019 Computers Materials & Continua  
To promote the practical application of quantum communication and network, security is an urgent problem to be solved.  ...  The application of quantum communication theory and technology cannot be separated from the quantum communication network.  ...  communication network To make quantum communication and quantum communication network practical, to expand the application and improve the distance of quantum communication, it is urgent to establish  ... 
doi:10.32604/cmc.2019.05668 fatcat:74ltvvnre5bhzpsim3vdpebo4a

How Hidden Can Be Even More Hidden? [article]

Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski
2011 arXiv   pre-print
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction  ...  To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram  ...  MULTI-LEVEL STEGANOGRAPHY (MLS) Multi-Level Steganography is a new concept of information hiding in telecommunication networks that was introduced to network steganography by Frączek, Mazurczyk and Szczypiorski  ... 
arXiv:1107.4065v1 fatcat:ozlgnqdouzc2vcxnistlpr4xv4

Steganography and Steganalysis in Voice over IP: A Review

Zhijun Wu, Junjun Guo, Chenlei Zhang, Changliang Li
2021 Sensors  
data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents.  ...  It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.  ... 
doi:10.3390/s21041032 pmid:33546240 pmcid:PMC7913304 fatcat:6b5ocz5rajhzzooh345couyjaq

Filtering for Private Collaborative Benchmarking [chapter]

Florian Kerschbaum, Orestis Terzidis
2006 Lecture Notes in Computer Science  
Secure Multi-Party Computation can offer protocols that can compute benchmarks without leaking the input variables.  ...  As building blocks we present the fastest implementation of Yao's millionaires' protocol and a protocol that achieves a fair shuffle in O(log n) rounds.  ...  The protocol is multi-party and each party holds one input value to the computation.  ... 
doi:10.1007/11766155_29 fatcat:jhso5eqnq5abrmrs5dwxdny6sq
« Previous Showing results 1 — 15 out of 20,922 results