نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

Journal: :Physical review 2022

Quantum-key-distribution protocols are known to be vulnerable against a side channel attack that exploits the time difference in detectors' responses used obtain key bits. The recommended solution this timing is use large bin width instead of high-resolution information. A common notion using reduces resolution responses, hence supposedly minimizes information leakage an eavesdropper. We challe...

Journal: :Lecture Notes in Computer Science 2023

Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website’s user sensitive information such as user’s login password third-party CDN. In this paper, we measure quantify the extent of exposure CDNs. We find that among Alexa...

2017
S. Usharani

Eliminate the eavesdropper collusion occurredby the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput.This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security i...

Journal: :IEEE Transactions on Information Theory 2008

Journal: :IEEE Transactions on Information Forensics and Security 2017

2017

Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to determine the web activity of a client, even if the client is using privacy technologies such as proxies, VPNs, or Tor. Recent work has highlighted the threat of website fingerprinting to privacy-sensitive web users. Many previously designed defenses against website fingerprinting have been broken by newer a...

2018
Moslem Forouzesh Paeiz Azmi Nader Mokari Kai Kit Wong

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

2000
Hiroo Azuma Masashi Ban

In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confi...

Journal: :CoRR 2015
Osamu Hirota

This research note II introduces a way to understand a basic concept of the quantum enigma cipher. The conventional cipher is designed by a mathematical algorithm and its security is evaluated by the complexity of the algorithm in security analysis and ability of computers. This kind of cipher can be decrypted with probability one in principle by the Brute force attack in which an eavesdropper ...

2013
Tao Wang Ian Goldberg

Website fingerprinting attacks allow a local, passive eavesdropper to identify a web browsing client’s destination web page by extracting noticeable and unique features from her traffic. Such attacks magnify the gap between privacy and security — a client who encrypts her communication traffic may still have her browsing behaviour exposed to lowcost eavesdropping. Previous authors have shown th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید