Cryptography Reference
In-Depth Information
[KA98]
Markus G. Kuhn and Ross J. Anderson. Soft tempest:
Hidden data transmission using electromagnetic ema-
nations. In Information Hiding Workshop, Lecture Notes
of Computer Science (1525) , NewYork, Heidelberg, 1998.
Springer-Verlag.
[Kah67]
David Kahn. The Codebreakers . Macmillan, New York
City, 1967.
[KBC + 00]
John Kubiatowicz, David Bindel, Yan Chen, Patrick
Eaton, Dennis Geels, Ramakrishna Gummadi, Sean
Rhea, Hakim Weatherspoon, Westly Weimer, Christo-
pher Wells, and Ben Zhao. Oceanstore: An architec-
ture for global-scale persistent storage. In Proceedings
of ACMASPLOS . ACM, November 2000.
[KCR04]
Ton Kalker, Ingemar J. Cox, and Yong Man Ro, editors.
Digital Watermarking, Second International Workshop,
IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised
Papers , volume 2939 of Lecture Notes in Computer Sci-
ence . Springer, 2004.
[Kea89]
Michael Kearns. The Computational Complexity of Ma-
chine Learning . PhD thesis, Harvard University Center
for Research in Computing Technology, May 1989.
[KH98]
Deepa Kundur and Dimitrios Hatzinakos. Digital wa-
termarking using multiresolution wavelet decomposi-
tion. In International Conference on Acoustic, Speech
and Signal Processing (ICASP) , volume 5, pages 2969-
2972, Seattle, Washington, U.S.A., 1998.
[KH99]
Deepa Kundur andD. Hatzinakos. Digital watermarking
for telltale tamper-proofing and authentication. Pro-
ceedings of the IEEE Special Issue on Identification and
Protection of Multimedia Information , 87(7):1167-1180,
July 1999.
[Kip03]
Gregory Kipper. Investigator's Guide to Steganography .
CRC Press, Inc., Boca Raton, FL, USA, 2003.
[Knu81]
D. Knuth. The Art of Computer Programming: Volume
2, Seminumerical Algorithms . 2nd edition, Addison-
Wesley, Reading, MA, 1981.
[KO84]
Hugh Kenner and JosephO'Rourke. A travesty generator
for micros. BYTE , page 129, November 1984.
Search WWH ::




Custom Search