{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:50Z","timestamp":1725491870713},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_9","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T23:06:39Z","timestamp":1189638399000},"page":"124-144","source":"Crossref","is-referenced-by-count":3,"title":["Noisy Timing Channels with Binary Inputs and Outputs"],"prefix":"10.1007","author":[{"given":"Keye","family":"Martin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ira S.","family":"Moskowitz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Ash, R.B.: Information Theory. Dover (1965)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TIT.1980.1056175","volume":"26","author":"S. Golomb","year":"1980","unstructured":"Golomb, S.: The limiting behavior of the Z-channel. IEEE Transactions on Information theory\u00a026, 372 (1980)","journal-title":"IEEE Transactions on Information theory"},{"key":"9_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0361-5","volume-title":"Information and Coding Theory","author":"G.A. Jones","year":"2000","unstructured":"Jones, G.A., Jones, J.M.: Information and Coding Theory. Springer, Heidelberg (2000)"},{"key":"9_CR4","volume-title":"A Pump for Rapid, Reliable, Secure Communication","author":"M.H. Kang","year":"1994","unstructured":"Kang, M.H., Moskowitz, I.S.: A Pump for Rapid, Reliable, Secure Communication. In: 1st ACM Conference on Computer and Communications Security. ACM Press, New York (1994)"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/32.502225","volume":"22","author":"M.H. Kang","year":"1996","unstructured":"Kang, M.H., Moskowitz, I.S., Lee, D.C.: A Network Pump. IEEE Transactions on Software Engineering\u00a022(5), 329\u2013338 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"9_CR6","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Communications of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Majani, E.E., Rumsey, H.: Two results on binary input discrete memoryless channels. In: IEEE International Symposium on Information Theory, p. 104 (June 1991)","DOI":"10.1109\/ISIT.1991.695160"},{"key":"9_CR8","unstructured":"Martin, K.: NRL memorandum report: 5540\u201306-8945 (March 24, 2006)"},{"key":"9_CR9","unstructured":"Martin, K.: The simulation of covert timing channels, 2006 (preprint)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Martin, K., Moskowitz, I.S., Allwein, G.: Algebraic information theory for binary channels. In: Proc. 22nd Conference on the Mathematical Foundations of Programming Semantics. Electronic Notes in Theoretical Computer Science (2006)","DOI":"10.1016\/j.entcs.2006.04.015"},{"key":"9_CR11","unstructured":"Moeller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol version 2. Internet-Draft (2003), http:\/\/www.abditum.com\/mixmaster-spec.txt"},{"issue":"7","key":"9_CR12","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1109\/18.737549","volume":"44","author":"I.S. Moskowitz","year":"1998","unstructured":"Moskowitz, I.S., Greenwald, S., Kang, M.H.: An analysis of the timed Z-channel. IEEE Transactions on Information Theory\u00a044(7), 3162\u20133168 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/WITS.1994.513922","volume-title":"Proceedings 1994 IEEE-IMS Workshop on Information Theory and Statistics","author":"I.S. Moskowitz","year":"1994","unstructured":"Moskowitz, I.S., Kang, M.H.: Discussion of a statistical channel. In: Proceedings 1994 IEEE-IMS Workshop on Information Theory and Statistics, Alexandria, VA, USA, p. 95. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Miller, A.R.: Simple timing channels. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 56\u201364, Oakland, CA, (May 16-18, 1994)","DOI":"10.1109\/RISP.1994.296592"},{"key":"9_CR15","unstructured":"Moskowitz, I.S., Newman, R.E.: Timing channels, anonymity, mixes, and spikes. In: Proc. Int. Conf. on Advances in Computer Science and Technology\u2014ACST 2006 Puerto Vallerta, Mexico, IASTED (2006)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Newman, R.E., Crepeau, D.P., Miller, A.R.: Covert channels and anonymizing networks. In: ACM WPES, pp. 79\u201388, Washington (October 2003)","DOI":"10.21236\/ADA465268"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Newman, R.E., Crepeau, D.P., Miller, A.R.: A detailed mathematical analysis of a class of covert channels arising in certain anonymizing networks. Memorandum Report NRL\/MRL\/5540\u201303-8691, NRL (August 2003)","DOI":"10.21236\/ADA417139"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/NDSS.1997.579214","volume-title":"Proc. IEEE 1997 Symposium on Network and Distributed System Security","author":"N. Ogurtsov","year":"1997","unstructured":"Ogurtsov, N., Orman, H., Schroeppel, R., O\u2019Malley, S., Spatscheck, O.: Experimental results of covert channel limitation in one-way communication systems. In: Proc. IEEE 1997 Symposium on Network and Distributed System Security, pp. 2\u201315. IEEE, New York (1997)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Proceedings of Information Hiding Workshop (IH 2002)","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Systems Technical Journal 27, 379\u2013423, 623\u2013656 (1948)","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"issue":"3","key":"9_CR21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TIT.1955.1055138","volume":"1","author":"R.A. Silverman","year":"1955","unstructured":"Silverman, R.A.: On binary channels and their cascades. IRE Transactions on Information Theory\u00a01(3), 19\u201327 (1955)","journal-title":"IRE Transactions on Information Theory"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Tallini, L.G., Al-Bassam, S., Bose, B.: On the capacity and codes for the Z-channel. In: Proc. ISIT 2002, pp. 422 (2002)","DOI":"10.1109\/ISIT.2002.1023694"},{"issue":"5","key":"9_CR23","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/18.57201","volume":"36","author":"S. Verd\u00fa","year":"1992","unstructured":"Verd\u00fa, S.: On channel capacity per unit cost. IEEE Transactions on Information Theory\u00a036(5), 1019\u20131030 (1992)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR24","unstructured":"Verd\u00fa, S.: Channel Capacity, Chapter 73.5. The Electrical Engineering Handbook, CRC Press (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:11:25Z","timestamp":1619503885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}