Cryptography Reference
In-Depth Information
[DS03]
Claudia Dıaz and Andrei Serjantov. Generalising mixes.
In Roger Dingledine, editor, Proceedings of Privacy En-
hancing Technologies workshop (PET 2003) , pages 18-
31. Springer-Verlag, LNCS 2760, March 2003.
[DW04]
Edward J. Delp and Ping Wah Wong, editors. Security,
Steganography, and Watermarking of Multimedia Con-
tents VI, San Jose, California, USA, January 18-22, 2004,
Proceedings , volume 5306 of Proceedings of SPIE .SPIE,
2004.
[DW05]
Edward J. Delp and Ping Wah Wong, editors. Security,
Steganography, and Watermarking of Multimedia Con-
tents VII, San Jose, California, USA, January 17-20, 2005,
Proceedings , volume 5681 of Proceedings of SPIE .SPIE,
2005.
[ed.92]
G.J. Simmons ed. Contemporary Cryptology: The Sci-
ence of Information Integrity .
IEEE Press, Piscataway,
NJ, 1992.
[EKK04]
Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hid-
ing Information in Program Binaries. In Proceedings
of the 6 th International Conference on Information and
Communications Security (ICICS) , pages 187-199, Octo-
ber 2004.
[ElG85]
T. ElGamal. A public-key cryptosystem and a signature
scheme based on discrete logarithms. In Advances in
Cryptology: Proceedings of CRYPTO 84 .Springer-Verlag,
1985.
[ESG00a]
Joachim J. Eggers, Jonathan K. Su, and Bernd Girod.
Asymmetric watermarking schemes. In Sicherheit in
Mediendaten , Berlin, Germany, September 2000.
[ESG00b]
Joachim J. Eggers, Jonathan K. Su, and Bernd Girod.
Public-key watermarking by eigenvectors of linear
transforms. In EUSIPCO 2000 ,Tampere,Finland,
September 2000.
[Ett98]
J. Mark Ettinger. Steganalysis and game equilibria. In In-
formation Hiding Workshop, Lecture Notes of Computer
Science (1525) , New York, Heidelberg, 1998. Springer-
Verlag.
Search WWH ::




Custom Search