A combinatorial approach to network covert communications with applications in Web Leaks

Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee. A combinatorial approach to network covert communications with applications in Web Leaks. In Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011. pages 474-485, IEEE, 2011. [doi]

Abstract

Abstract is missing.