نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

Journal: :IACR Cryptology ePrint Archive 2014
Geraldo A. Barbosa Jeroen van de Graaf

Coherent light, as produced by lasers, gives rise to an intrinsic noise, known as quantum noise, optical noise or shot noise. AlphaEta is a protocol which exploits this physical phenomenon to obtain secure data encryption or key distribution over a fiber-optic channel in the presence of an eavesdropper. In this paper we focus on the cryptographic aspects of AlphaEta and its variants. Moreover, ...

2014
O. Ozan Koyluoglu Yanling Chen Aydin Sezgin

In this paper, we study the problem of secure communication over the broadcast channel with receiver side information, under the lens of individual secrecy constraints (i.e., information leakage from each message to an eavesdropper is made vanishing). Several coding schemes are proposed by extending known results in broadcast channels to this secrecy setting. In particular, individual secrecy p...

Journal: :Security and Communication Networks 2022

Internet-of-Things (IoT) networks generally contain resource-constrained devices that require an energy-efficient key generation procedure to producing secure keys at a faster rate. The physical characteristics of the wireless channel can be exploited communication within IoT networks. In particular, secret generated by leveraging on randomness between two communicating parties. conventional me...

2008
Shabnam Shafiee

Title of dissertation: SIGNALLING AND RESOURCE ALLOCATION FOR SECURE COMMUNICATION IN GAUSSIAN WIRELESS CHANNELS Shabnam Shafiee, Doctor of Philosophy, 2008 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical and Computer Engineering Gaussian wireless channels are studied under two forms of security attacks: (i) the jamming attack, where the adversary is active and transm...

1998
Kostas Hatzis

The Distributed Systems Platform (DSP) is a software platform that has been designed for the implementation, simulation and testing of distributed protocols. It ooers a set of subtools which permit the researcher and the protocol designer to work under a familiar graphical and algorithmic environment. In this work we use the DSP and study the pursuit evasion problem in distributed environments ...

2013
Vladimir M. Blinovsky Minglai Cai

The arbitrarily varying channel models transmission over a channel with an state that can change over time. We may interpret it as a channel with an evil jammer. The arbitrarily varying channel was first introduced by Blackwell, Breiman, and Thomasian in [8]. The wiretap channel models communication with security. It was first introduced by Wyner in [12]. We may interpret it as a channel with a...

Journal: :IEEE Transactions on Signal Processing 2021

We consider a wireless source localization network in which target node emits signals that are used by anchor nodes to estimate the position. In addition and nodes, there can also exist eavesdropper jammer aim position of degrade accuracy localization, respectively. first propose problem selection with goal optimally placing given number subset possible positions as accurately possible. As perf...

Journal: :IEEE Transactions on Information Forensics and Security 2021

Website Fingerprinting (WF) is a type of traffic analysis attack that enables local passive eavesdropper to infer the victim's activity, even when protected by VPN or an anonymity system like Tor. Leveraging deep-learning classifier, WF attacker can gain over 98% accuracy on Tor traffic. In this paper, we explore novel defense, Mockingbird, based idea adversarial examples have been shown underm...

Journal: :CoRR 2017
Meryem Benammar Abdellatif Zaidi

In this work, we investigate two source coding models, a Helper problem and a Gray-Wyner problem, under equivocation constraints. Specifically, in the Helper problem, an encoder communicates with a legitimate receiver through a noise-free rate-limited public link as well as a noise-free rate-limited private link; and an external passive eavesdropper intercepts every information that is sent on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید