Cryptography Reference
In-Depth Information
[DS03]
Claudia Dıaz and Andrei Serjantov. Generalising mixes.
In Roger Dingledine, editor,
Proceedings of Privacy En-
hancing Technologies workshop (PET 2003)
, pages 18-
31. Springer-Verlag, LNCS 2760, March 2003.
[DW04]
Edward J. Delp and Ping Wah Wong, editors.
Security,
Steganography, and Watermarking of Multimedia Con-
tents VI, San Jose, California, USA, January 18-22, 2004,
Proceedings
, volume 5306 of
Proceedings of SPIE
.SPIE,
2004.
[DW05]
Edward J. Delp and Ping Wah Wong, editors.
Security,
Steganography, and Watermarking of Multimedia Con-
tents VII, San Jose, California, USA, January 17-20, 2005,
Proceedings
, volume 5681 of
Proceedings of SPIE
.SPIE,
2005.
[ed.92]
G.J. Simmons ed.
Contemporary Cryptology: The Sci-
ence of Information Integrity
.
IEEE Press, Piscataway,
NJ, 1992.
[EKK04]
Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hid-
ing Information in Program Binaries. In
Proceedings
of the
6
th
International Conference on Information and
Communications Security (ICICS)
, pages 187-199, Octo-
ber 2004.
[ElG85]
T. ElGamal. A public-key cryptosystem and a signature
scheme based on discrete logarithms. In
Advances in
Cryptology: Proceedings of CRYPTO 84
.Springer-Verlag,
1985.
[ESG00a]
Joachim J. Eggers, Jonathan K. Su, and Bernd Girod.
Asymmetric watermarking schemes. In
Sicherheit in
Mediendaten
, Berlin, Germany, September 2000.
[ESG00b]
Joachim J. Eggers, Jonathan K. Su, and Bernd Girod.
Public-key watermarking by eigenvectors of linear
transforms. In
EUSIPCO 2000
,Tampere,Finland,
September 2000.
[Ett98]
J. Mark Ettinger. Steganalysis and game equilibria. In
In-
formation Hiding Workshop, Lecture Notes of Computer
Science (1525)
, New York, Heidelberg, 1998. Springer-
Verlag.