People sometimes need to communicate directly with one another while concealing the communication itself. Existing systems can allow users to achieve this level of privacy in the wide-area Internet, but parties who are in close proximity (e.g., a public square or coffee shop) may want a lightweight communications channel with similar properties. Today, covert exchanges in local settings typically require the exchange of physical media or involve other forms of direct communication (e.g., conversations, blind drops); most, if not all, of these exchanges are observable: in other words, even if the message exchanges are confidential, they are not covert or deniable. We construct a local communications channel that is unobservable to everyone e...
Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leavin...
In this paper, we combine sectorized transmission with artificial noise to establish secrecy in dece...
With the development of wireless networks, attacks such as personal information hijacking through pa...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Abstract—The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access t...
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, info...
Abstract. Secure multi-party computation (MPC) deals with the prob-lem of shared computation between...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates ...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Wireless secrecy is becoming crucial in many commercial and governmental sectors. In this paper, the...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Packet-switched computer networks of all sizes are widely used for personal, professional, and gover...
Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leavin...
In this paper, we combine sectorized transmission with artificial noise to establish secrecy in dece...
With the development of wireless networks, attacks such as personal information hijacking through pa...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Abstract—The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access t...
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, info...
Abstract. Secure multi-party computation (MPC) deals with the prob-lem of shared computation between...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates ...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Wireless secrecy is becoming crucial in many commercial and governmental sectors. In this paper, the...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Packet-switched computer networks of all sizes are widely used for personal, professional, and gover...
Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leavin...
In this paper, we combine sectorized transmission with artificial noise to establish secrecy in dece...
With the development of wireless networks, attacks such as personal information hijacking through pa...