Creator | Title | Description | Subject | Date | ||
---|---|---|---|---|---|---|
1 | Kasera, Sneha K. | Enhancing covert communications with multiple colluding receivers | Traditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un... | 2010-10-06 |