Cryptography Reference
In-Depth Information
1996, Proceedings
, volume 1174 of
Lecture Notes in Com-
puter Science
. Springer, 1996.
[And96c]
Ross J. Anderson. Stretching the limits of stegano-
graphy. In
Information Hiding
[And96b], pages 39-48.
[And01]
Ross J. Anderson.
Security Engineering: A Guide to
Building Dependable Distributed Systems
.JohnW ley
and Sons, 2001.
[And07]
Nate Anderson. Steroid bust shows feds can still get at
'private' and 'secure' e-mail.
Ars Technica.com
,Novem-
ber 2007.
[ANS98]
Ross Anderson, Roger Needham, and Adi Shamir. The
steganographic file system. In
IWIH: International
Workshop on Information Hiding
, 1998.
[AP98]
Ross Anderson and Fabien Petitcolas. On the limits of
steganography.
IEEE Journal on Selceted Areas in Com-
munications
, pages 474-481, May 1998.
[Ara88]
Benjamin Arazi.
A Commonsense Approach to the The-
ory of Error Correcting Codes
.MITPress,Cambridge,
MA, 1988.
[ARC
+
01] Mikhail J. Atallah, Victor Raskin, Michael Crogan, Chris-
tian Hempelmann, Florian Kerschbaum, Dina Mo-
hamed, and Sanket Naik. Natural language watermark-
ing: Design, analysis, and a proof-of-concept imple-
mentation. In Ira S. Moskowitz, editor,
Information
Hiding: Fourth International Workshop
, volume 2137
of
Lecture Notes in Computer Science
, pages 185-199.
Springer, April 2001.
[ARH
+
02] Mikhail J. Atallah, Victor Raskin, Christian F. Hempel-
mann, Mercan Karahan, Radu Sion, Umut Topkara, and
Katrina E. Triezenberg. Natural language watermarking
and tamperproofing. In Fabien A. P. Petitcolas, editor,
Information Hiding: Fifth International Workshop
,vol-
ume 2578 of
Lecture Notes in Computer Science
,pages
196-212. Springer, October 2002.
[ARH
+
03] Mikhail J. Atallah, Victor Raskin, Christian Hempel-
mann, Mercan Karahan, Radu Sion, Umut Topkara, and
Katrina E. Triezenberg. Natural language watermark-
ing and tamperproofing. In
IH '02: Revised Papers from