Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item.Includes bibliographical references (leaves 36-38).Issued also on microfiche from Lange Micrographics.In this thesis, we present unicast and multicast protocols to resist eavesdropping and traffic profiling of group communications. At the application layer, we propose a secret-sharing approach for the exchange of shared keys. That is, multicast groups use digital signatures to identify a specific secret-sharing rule, so that nodes in the same group can determine their session keys independ...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
An onion routing based anonymous communication system is developed to address timing analysis attack...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper\u27s point...
Multicast is the delivery of a message or information to a group of destination computers simultaneo...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
textIP multicast is a network service for scalable distribution of data to multiple receivers. Trad...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
Colloque avec actes et comité de lecture. internationale.International audienceWith emerging of new ...
Support de cours.With emerging of new cooperative applications, the group communication is clearly b...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper's poi...
This dissertation addresses the important challenge of efficiency in anonymous communication. Solvin...
A new proposal for group key exchange is introduced which proves to be both efficient and secure and...
We study the problem of secure communication in a multi-channel, single-hop radio network with a mal...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
An onion routing based anonymous communication system is developed to address timing analysis attack...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper\u27s point...
Multicast is the delivery of a message or information to a group of destination computers simultaneo...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
textIP multicast is a network service for scalable distribution of data to multiple receivers. Trad...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
Colloque avec actes et comité de lecture. internationale.International audienceWith emerging of new ...
Support de cours.With emerging of new cooperative applications, the group communication is clearly b...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper's poi...
This dissertation addresses the important challenge of efficiency in anonymous communication. Solvin...
A new proposal for group key exchange is introduced which proves to be both efficient and secure and...
We study the problem of secure communication in a multi-channel, single-hop radio network with a mal...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
An onion routing based anonymous communication system is developed to address timing analysis attack...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...