Cryptography Reference
In-Depth Information
1996, Proceedings , volume 1174 of Lecture Notes in Com-
puter Science . Springer, 1996.
[And96c]
Ross J. Anderson. Stretching the limits of stegano-
graphy. In Information Hiding [And96b], pages 39-48.
[And01]
Ross J. Anderson. Security Engineering: A Guide to
Building Dependable Distributed Systems .JohnW ley
and Sons, 2001.
[And07]
Nate Anderson. Steroid bust shows feds can still get at
'private' and 'secure' e-mail. Ars Technica.com ,Novem-
ber 2007.
[ANS98]
Ross Anderson, Roger Needham, and Adi Shamir. The
steganographic file system. In IWIH: International
Workshop on Information Hiding , 1998.
[AP98]
Ross Anderson and Fabien Petitcolas. On the limits of
steganography. IEEE Journal on Selceted Areas in Com-
munications , pages 474-481, May 1998.
[Ara88]
Benjamin Arazi. A Commonsense Approach to the The-
ory of Error Correcting Codes .MITPress,Cambridge,
MA, 1988.
[ARC + 01] Mikhail J. Atallah, Victor Raskin, Michael Crogan, Chris-
tian Hempelmann, Florian Kerschbaum, Dina Mo-
hamed, and Sanket Naik. Natural language watermark-
ing: Design, analysis, and a proof-of-concept imple-
mentation. In Ira S. Moskowitz, editor, Information
Hiding: Fourth International Workshop , volume 2137
of Lecture Notes in Computer Science , pages 185-199.
Springer, April 2001.
[ARH + 02] Mikhail J. Atallah, Victor Raskin, Christian F. Hempel-
mann, Mercan Karahan, Radu Sion, Umut Topkara, and
Katrina E. Triezenberg. Natural language watermarking
and tamperproofing. In Fabien A. P. Petitcolas, editor,
Information Hiding: Fifth International Workshop ,vol-
ume 2578 of Lecture Notes in Computer Science ,pages
196-212. Springer, October 2002.
[ARH + 03] Mikhail J. Atallah, Victor Raskin, Christian Hempel-
mann, Mercan Karahan, Radu Sion, Umut Topkara, and
Katrina E. Triezenberg. Natural language watermark-
ing and tamperproofing. In IH '02: Revised Papers from
Search WWH ::




Custom Search