- Bad90.Lee Badger, Providing a tlexible security override for trusted systems, in Proceedings of Computer Security Foundations, Workshop Ill; Eranconia, NH, June 1990.Google Scholar
- Bar64.Paul Bara.n. On distributed communications, vol ix. In Security Secrecy a'rtd Tamper Free Consideral:ions, Memo .t~M-3765-PI?. Ra.nd Corp., Santa Monica, CA, August i964.Google Scholar
- Bro94.Randy Browne. Mode Security: An infrastructure for covert chanllel suppression. In Proceedin9s of the IEk,'E Symposium on Rcsca'rch in Security and Privacy, Oakland, CA, M~y 1994. Google ScholarDigital Library
- Fra94.Jercmy li'ra.nk. Machine learning and intrusion detectim~: Curre~lt a.nd future directions. I~, P~oceedings of the 17th National Computer Security Conference, October 1994.Google Scholar
- Gas88.Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold Company, New York, NY, 1988. Google ScholarDigital Library
- GRS96.D.M. Cloldschlag, M.C,. Reed, and P.F. Syverson. Hiding routing information. In Workshop on Information Hiding, Cambridge, UK, May 1996. Google ScholarDigital Library
- HW89.M.P. Herlihy and J.M. Wing. Specifying security constraAnts with relaxation lattices. In Proceedings of Computer Security Fou'r~dations Workshop ll, Vranconia, NH, June 1989.Google ScholarCross Ref
- ISO84.ISO. information Process Systems- Open System Interconnection - Basic Reference Model- IS() 7498. American National Standards Association, Inc., New York, NY, 1984.Google Scholar
- ISO88.ISO. Information Process Systems- Open System Interconnection Proposed Draft Addendum 2 ISO 7498. American National Standards Association, Inc., New York, NY, .1988.Google Scholar
- ISO92.ISO. ISO/IEC JTC1/SC6, Network Layer Security Protocol. ISO-IEC DIS 11577 International Standa.rds Organisation, November 29 1992.Google Scholar
- JV91.ttarold R. Javitz ~nd Alfonso Valdes. The SRI IDES statistical anomaly detector. In Proceedings of the lEER Symposiurr~ on Research in Security and Privacy, Oakland, CA, April 1991.Google Scholar
- KM93.Myong t i. i(ang and Ira S. Moskowitz. A pump tot rapid, reliable, secure communication. In Proceedings of the A CM Conference on Computer and Communication Security, Fairfax, VA, 1993. Google ScholarDigital Library
- KML95.Myong {I. B:ang, Ira S. Moskowitz, and Daniel C. Lee. A network version of the pump. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. Google ScholarDigital Library
- KML96.Myong t l. Kang, IrzL S. Moskowitz, and Daniel C. Lee. A network pump. IEEE Transaction on Software Enginecri~9, 22(5), May 1996. Google ScholarDigital Library
- Mac93.Betty Ma,ckman. Reorganized N LSP. DRA/CIS/(SIV_;2)/l~M/93/.3/1, Defence Research Agency, March 1993.Google Scholar
- McL90.John McLean. Security models and information flow. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1990.Google ScholarCross Ref
- MK94.Ira S. Moskowitz and Myong ft. Kang. Covert channels - here to stay? In Proceedings of COM- PASS '9/t, Gaithersburg, MD, June 27- July 1 1994. IEBE Press.Google Scholar
- NWV91.R. E. Newman-Wolfe a.nd B. R. Venkatraman. itigh level prevention of traffic analysis. In Scvcr~th Annual Computer Security Applications Co'nferc'nce, San Antonio, Texas, December 1991.Google Scholar
- Ram90.Raju Ramaswamy. Traffic flow confidentiality security service in OSI computer network architecture. In Proceedings of the IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, September 1990.Google ScholarCross Ref
- RS93.Charles Rackoff ~nd Daniel R. Simon. Cryptographic defense against traffic analysis. In Proceedings of the 25th Annual Symposium on the Theory of Computing, CA, USA, May 1993. Google ScholarDigital Library
- Ven94.B. Venkatraman. Prevention of Traffic Analysis and Associated Covert Channels. PhD thesis, University of Florida, Gainsville, Florida, 1994. Google ScholarDigital Library
- VK83.V.L. Voydock ~nd S. T. Kent. Security mechanisms in high-level network protocols. A CM Cornputing Surveys, 15(3), June 1983. Google ScholarDigital Library
- Web88.Douglas Weber. Security policies for army tactical C2 systems. Technical report, Odyssey Research Associates, Inc., Ithaca, NY, 1988.Google Scholar
Index Terms
- A security model for dynamic adaptive traffic masking
Recommendations
Certificateless public key encryption in the selective-ID security model
Pairing'07: Proceedings of the First international conference on Pairing-Based CryptographyThe concept of Certificateless Public Key Encryption (CLPKE) eliminates the use of certificates in certified Public Key Encryption (PKE) scheme and the key-escrow problem in Identity Based Encryption (IBE) scheme. Al-Riyami and Paterson first proposed a ...
Revocable hierarchical identity-based encryption with adaptive security
AbstractHierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectively secure RHIBE schemes were ...
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
In this study, we consider the problem of constructing a homomorphic encryption scheme that is secure against adaptive chosen ciphertext attack (CCA2). This type of scheme has many applications in secure multi-party computation, electronic voting, and ...
Comments