Cryptography Reference
In-Depth Information
[SY98]
Sabrina Sowers and Abdou Youssef. Testing digital wa-
termark resistance to destruction. In Information Hid-
ing Workshop, Lecture Notes of Computer Science (1525) ,
New York, Heidelberg, 1998. Springer-Verlag.
[TA05]
Eugene Tumoian and Maxim Anikeev. Network based
detection of passive covert channels in tcp/ip. In LCN
'05: Proceedings of the The IEEE Conference on Local
Computer Networks 30th Anniversary , pages 802-809,
Washington, DC, USA, 2005. IEEE Computer Society.
[Tah92]
H. Taha. Operations Research An Introduction .Macmil-
lan Publishing Company., New York, 1992.
[TB06]
Parisa Tabriz and Nikita Borisov. Breaking the collu-
sion detection mechanism of morphmix. In George
Danezis and Philippe Golle, editors, Privacy Enhancing
Technologies , volume 4258 of Lecture Notes in Computer
Science , pages 368-383. Springer, 2006.
[TL05]
Tommaso Toffoli and Lev B. Levitin. Specific ergodicity:
an informative indicator for invertible computational
media. In Bagherzadeh et al. [BVR05], pages 52-58.
[TM87]
Tommaso Toffoli and Norman Margolus. Cellular Au-
tomata Machines . MIT Press, London, 1987.
[Tof77a]
T. Toffoli. Cellular AutomataMechanics . PhD thesis, The
University of Michigan, 1977.
Toffoli's demonstration of reversible universal computa-
tion.
[Tof77b]
Tommaso Toffoli. Computation and construction uni-
versality of reversible cellular automata. Journal of
Computer and System Sciences , 15:213-231, 1977.
[TRHTA06] Mercan Topkara, Guiseppe Riccardi, Dilek Hakkani-Tur,
and Mikhail J. Atallah. Natural language watermark-
ing: Challenges in building a practical system. In Pro-
ceedings of the SPIE International Conference on Secu-
rity, Steganography, and Watermarking of Multimedia
Contents , January 2006.
[TTA06]
Umut Topkara, Mercan Topkara, and Mikhail J. Atal-
lah. The hiding virtues of ambiguity: quantifiably re-
silient watermarking of natural language text through
synonym substitutions.
In MM&Sec '06: Proceedings
Search WWH ::




Custom Search