Back to Results
First PageMeta Content
OSI protocols / Routing / Steganography / Wireless networking / Link-state routing protocol / Interior Gateway Routing Protocol / Covert channel / Optimized Link State Routing Protocol / Open Shortest Path First / Network architecture / Routing protocols / Computing


Journal of Information Assurance and Security[removed] Steganographic Routing in
Add to Reading List

Document Date: 2008-04-15 17:14:10


Open Document

File Size: 489,13 KB

Share Result on Facebook

City

Las Vegas / Veldhoven / Geneve / Warszawa / Washington / DC / Atlanta / Bologna / Toulouse / /

Company

Ad Hoc Networks / Distributed Systems / MIT Press / Multiagent Systems / Emerging Technologies / Dynamic Publishers Inc / PET / Coruppted Networks / J.R. Erenkrantz S.A. / Zero Knowledge Systems Inc. / IBM / New SA / Network Security Group / Multi-Agent Systems / ACM Press / Google / AAAI Press/The MIT Press / Peer-Reviewed Journal / CSREA Press / /

Country

Switzerland / Netherlands / France / Italy / Poland / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Wojciech Mazurczyk Warsaw University of Technology / Hidden Communication System / Warsaw University of Technology / University of Sterling / Institute of Telecommunications / /

IndustryTerm

distance vector routing protocol / Web applications / transportation / distance vector protocol / multi agent systems / multimedia services / Wireless Routing Protocol / Web browsing / random-walk algorithm / communication protocol / steganographic systems / steg-routing protocol / anonymity services / anonymity systems / link state protocol / trust management / secondgeneration onion router / random walk algorithm / distance vector proactive algorithm / telecommunications / Web Transactions / grid computing / reason distance vector protocol / prefect attack tools / multimedia applications / anonymous remailer protocol / communications security / overlay networks / protection tool / typical distance vector routing protocol / software components / anonymous networks / wireless networks / privacy enhancing technologies / given network / mobile agent systems / steganographic router / steganographic routing protocol / proposed protocol random walk algorithm / Internet Computing / security services / classical distance vector protocols / anonymous systems / electronic commerce / /

MusicGroup

Blaze / /

OperatingSystem

L3 / DoS / /

Organization

UC Berkeley / United States Army / Faculty of Electronics and Information Technology / European Research Office / Faculty of Electronics / MIT / Distributed Artificial Intelligence / University of Sterling / Institute of Telecommunications / Warsaw University of Technology / /

Person

G. Weiss / Patrick Doyle / Wojciech Mazurczyk / J. D. Guttman / V / Igor MargasiƄski / W. M. Farmer / /

Position

author / forward / editor / research assistant / general IP traffic anonymization / leader / assistant professor / Farmer / /

Product

P-0042 / other / TrustMAS / steganographic / /

ProgrammingLanguage

Java / /

ProvinceOrState

Georgia / Nevada / /

PublishedMedium

Elsevier / The Knowledge Engineering Review / Communications of the ACM / Journal of Cryptology / the Bell System Technical Journal / Lecture Notes in Computer Science / /

Technology

secondgeneration onion router / Information Technology / Steg-routing protocol / Data Hiding / TCP/IP Protocol / encryption / distance vector protocol / distance vector routing protocol / link state protocol / Java / anonymous remailer protocol / 240 The algorithm / same reason distance vector protocol / communication protocol / random-walk algorithm / proposed protocol random walk algorithm / existing routing protocols / typical distance vector routing protocol / privacy enhancing technologies / Proposed Steg-router / Public Key Infrastructure / 237 steganographic router / peer-to-peer / steganographic routing protocol / P2P / TCP/IP / steganographic router / ISDN / routing protocol / knowledge management / artificial intelligence / WLAN / random walk algorithm / classical distance vector protocols / Mixmaster Protocol / distance vector proactive algorithm / work Algorithm / network protocols / /

URL

http /

SocialTag