Covert Channels in LAN's
- 1 February 1987
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. SE-13 (2), 292-296
- https://doi.org/10.1109/tse.1987.233153
Abstract
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.Keywords
This publication has 9 references indexed in Scilit:
- Discrete logarithms in finite fields and their cryptographic significancePublished by Springer Nature ,2000
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Cryptographic Protocol for Trustable Match MakingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- How to exchange (secret) keysACM Transactions on Computer Systems, 1983
- Applied Cryptology, Cryptographic Protocols, and Computer Security ModelsProceedings of Symposia in Applied Mathematics, 1983
- How to share a secretCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976