{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:55Z","timestamp":1773247375432,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,11,12]],"date-time":"2008-11-12T00:00:00Z","timestamp":1226448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10207-008-0070-1","type":"journal-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T08:37:01Z","timestamp":1226392621000},"page":"121-135","source":"Crossref","is-referenced-by-count":14,"title":["SilentKnock: practical, provably undetectable authentication"],"prefix":"10.1007","volume":"8","author":[{"given":"Eugene Y.","family":"Vasserman","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[]},{"given":"James","family":"Tyra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,12]]},"reference":[{"issue":"6","key":"70_CR1","first-page":"12","volume":"12","author":"M. Krzywinski","year":"2003","unstructured":"Krzywinski M.: Port knocking: network authentication across closed ports. SysAdmin Mag. 12(6), 12\u201317 (2003)","journal-title":"SysAdmin Mag."},{"key":"70_CR2","unstructured":"Barham, P., Hand, S., Isaacs, R., Jardetzky, P., Mortier, R., Roscoe, T.: Techniques for lightweight concealment and authentication in IP networks. Technical Report IRB-TR-02-009, Intel Research Berkeley (Jul 2002)"},{"key":"70_CR3","unstructured":"Worth, D.: C\u00d6K: Cryptographic one-time knocking. In: Black Hat USA (2004)"},{"key":"70_CR4","doi-asserted-by":"crossref","unstructured":"deGraaf, R., Aycock, J., Jacobson, M.J.: Improved port knocking with strong authentication. In: Proc. ACSAC \u201905, pp. 451\u2013462","DOI":"10.1109\/CSAC.2005.32"},{"key":"70_CR5","unstructured":"The Open Source Vulnerability Database. http:\/\/osvdb.org\/ . Accessed 8 May 8 2008"},{"key":"70_CR6","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Attacks on RC4 and WEP. RSA Laboratories, Cryptobytes 5(2), (2002)"},{"key":"70_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T., Namprempre, C.: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In: Proc. CCS \u201902, pp. 1\u201311","DOI":"10.1145\/586110.586112"},{"key":"70_CR8","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1. In: Proc. Crypto 98, pp. 1\u201312","DOI":"10.1007\/BFb0055716"},{"key":"70_CR9","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Langford, J., Von Ahn, L.: Provably secure steganography. In: Proc. CRYPTO 2002, pp. 77\u201392","DOI":"10.1007\/3-540-45708-9_6"},{"key":"70_CR10","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP\/IP. In: Proc. Information Hiding 05, pp. 247\u2013261","DOI":"10.1007\/11558859_19"},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: The Poly1305-AES message authentication code. In: Proc. FSE 2005","DOI":"10.1007\/11502760_3"},{"key":"70_CR12","unstructured":"Linux 2.6.17.13 kernel source. drivers\/char\/random.c"},{"key":"70_CR13","unstructured":"Vasserman, E.Y., Hopper, N., Laxson, J., Tyra, J.: SilentKnock. http:\/\/www.cs.umn.edu\/~eyv\/knock\/ (April 2008)"},{"key":"70_CR14","unstructured":"Krzywinski, M.: Port knocking. http:\/\/www.portknocking.org\/"},{"key":"70_CR15","unstructured":"Graham-Cumming, J.: Practical secure port knocking. Dr. Dobb\u2019s Journal (Nov. 2004)"},{"key":"70_CR16","doi-asserted-by":"crossref","unstructured":"Manzanares, A.I., Marquez, J.T., Estevez-Tapiador, J.M., Castro, J.C.H.: Attacks on port knocking authentication mechanism. In: LNCS, vol. 3483, pp. 1292\u20131300 (2005)","DOI":"10.1007\/11424925_134"},{"key":"70_CR17","unstructured":"PK. Ahsan, D.K.: Practical data hiding in TCP\/IP. In: Proc. Workshop on Multimedia Security at ACM Multimedia (2002)"},{"key":"70_CR18","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. First Monday 2(5) (1997)","DOI":"10.5210\/fm.v2i5.528"},{"key":"70_CR19","unstructured":"Conehead: Stego hasho. Phrack 9(55), (1999)"},{"key":"70_CR20","unstructured":"MacDermid, T.: Stegtunnel. http:\/\/www.synacklabs.net\/OOB\/stegtunnel.html"},{"key":"70_CR21","doi-asserted-by":"crossref","unstructured":"Ahn, L.v., Hopper, N., Langford, J.: Covert two-party computation. In: Proc. STOC \u201905, pp. 513\u2013522","DOI":"10.1145\/1060590.1060668"},{"key":"70_CR22","unstructured":"Bond, M., Danezis, G.: The dining Freemasons: Security protocols for secret societies. In: Proc. 13th International Workshop on Security Protocols, Cambridge, England (2005)"},{"key":"70_CR23","doi-asserted-by":"crossref","unstructured":"Heffernan, A.: Protection of BGP sessions via the TCP MD5 signature option. http:\/\/www.ietf.org\/rfc\/rfc2385.txt (1998)","DOI":"10.17487\/rfc2385"},{"key":"70_CR24","unstructured":"Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional (2005)"},{"issue":"4","key":"70_CR25","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2004.57","volume":"2","author":"S Ring","year":"2004","unstructured":"Ring S, Cole E.: Taking a lesson from stealthy rootkits. IEEE Secur. Priv. 2(4), 38\u201345 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"70_CR26","doi-asserted-by":"crossref","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Proc. CRYPTO \u201996, pp. 313\u2013328","DOI":"10.1007\/3-540-68697-5_24"},{"key":"70_CR27","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Proc. CRYPTO\u201996, pp. 1\u201315","DOI":"10.1007\/3-540-68697-5_1"},{"key":"70_CR28","unstructured":"Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., Kozakai, Y., Morris, J., Boucher, M., Russell, R.: The netfilter.org project. http:\/\/www.netfilter.org\/"},{"key":"70_CR29","doi-asserted-by":"crossref","unstructured":"Postel, J. (ed.): Transmission control protocol. http:\/\/www.ietf.org\/rfc\/rfc0793.txt (1981)","DOI":"10.17487\/rfc0793"},{"key":"70_CR30","doi-asserted-by":"crossref","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proc. STOC \u201977, pp. 106\u2013112","DOI":"10.1145\/800105.803400"},{"key":"70_CR31","doi-asserted-by":"crossref","unstructured":"Aikat, J., Kaur, J., Smith, F.D., Jeffay, K.: Variability in TCP round-trip times. In: Proc. IMC\u201903, pp. 279\u2013284","DOI":"10.1145\/948205.948241"},{"issue":"2","key":"70_CR32","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S.M. Bellovin","year":"1989","unstructured":"Bellovin S.M.: Security problems in the TCP\/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32\u201348 (1989)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"70_CR33","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP authentication header. http:\/\/www.ietf.org\/rfc\/rfc2402.txt (1998)","DOI":"10.17487\/rfc2402"},{"key":"70_CR34","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Braden, R., Borman, D.: TCP extensions for high performance. http:\/\/www.ietf.org\/rfc\/rfc1323.txt (1992)","DOI":"10.17487\/rfc1323"},{"issue":"3","key":"70_CR35","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh D., Franklin M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"70_CR36","unstructured":"Borss, C.: DROP\/DENY vs. REJECT. http:\/\/web.archive.org\/web\/20060901114422\/ ; http:\/\/www.lk.etc.tu-bs.de\/lists\/archiv\/lug-bs\/2001\/msg05734.html (2001)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0070-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0070-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0070-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:23Z","timestamp":1559127683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0070-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,12]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["70"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0070-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,12]]}}}