IEEE Transactions on Software Engineering
Experimental Results Of Covert Channel Limitation In One-Way Communication Systems
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Timing channels, anonymity, mixes, and spikes
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Topology in information theory in topology
Theoretical Computer Science
ACM Transactions on Information and System Security (TISSEC)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?
ACM SIGMOBILE Mobile Computing and Communications Review
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding information in multi level security systems
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
An attack-defense game theoretic analysis of multi-band wireless covert timing networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Protecting confidential data on personal computers with storage capsules
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
An analysis of the timed Z-channel
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Evaluating the transmission rate of covert timing channels in a network
Computer Networks: The International Journal of Computer and Telecommunications Networking
New constructive approach to covert channel modeling and channel capacity estimation
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.01 |
We discuss the different ways of defining channel capacity for certain types of illicit communication channels. We also correct some errors from the literature, offer new proofs of some historical results, and give bounds for channel capacity. Special function techniques are employed to express the results in closed form. We conclude with examples.