Covert Channels in LAN's
@article{Girling1987CovertCI, title={Covert Channels in LAN's}, author={C. G. Girling}, journal={IEEE Transactions on Software Engineering}, year={1987}, volume={SE-13}, pages={292-296} }
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.
198 Citations
A Novel Covert Channel Based on Length of Messages
- Computer Science
- 2009 International Symposium on Information Engineering and Electronic Commerce
- 2009
- 51
An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite
- Computer Science
- ECIW
- 2005
- 10
- PDF
A survey of covert channels and countermeasures in computer network protocols
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2007
- 421
- Highly Influenced
- PDF
References
SHOWING 1-10 OF 18 REFERENCES
Cryptographic Protocol for Trustable Match Making
- Computer Science
- 1985 IEEE Symposium on Security and Privacy
- 1985
- 33
Safeguarding cryptographic keys
- Computer Science
- 1979 International Workshop on Managing Requirements Knowledge (MARK)
- 1979
- 2,224
An Improved Algorithm for Computing Logarithms over GP(p) and Its Cryptographic Significance
- Computer Science
- 1973
- 530
- PDF
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.)
- Mathematics, Computer Science
- IEEE Trans. Inf. Theory
- 1978
- 1,041
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure
- Mathematics, Computer Science
- CRYPTO
- 1984
- 15