IEEE Transactions on Software Engineering
Spikes: exploring the neural code
Spikes: exploring the neural code
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Spiking Neuron Models: An Introduction
Spiking Neuron Models: An Introduction
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Covert channels and anonymizing networks
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Anonymity and covert channels in simple timed mix-firewalls
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
An analysis of the timed Z-channel
IEEE Transactions on Information Theory
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
Hi-index | 0.00 |
In this paper we consider how timing channels (from high assurance computing) arise in the study of certain anonymity systems. We then discuss how the same type of Shannon analysis for these timing channels applies to spikes (action potentials in the field of neuroscience).