Cryptography Reference
In-Depth Information
[SY98]
Sabrina Sowers and Abdou Youssef. Testing digital wa-
termark resistance to destruction. In
Information Hid-
ing Workshop, Lecture Notes of Computer Science (1525)
,
New York, Heidelberg, 1998. Springer-Verlag.
[TA05]
Eugene Tumoian and Maxim Anikeev. Network based
detection of passive covert channels in tcp/ip. In
LCN
'05: Proceedings of the The IEEE Conference on Local
Computer Networks 30th Anniversary
, pages 802-809,
Washington, DC, USA, 2005. IEEE Computer Society.
[Tah92]
H. Taha.
Operations Research An Introduction
.Macmil-
lan Publishing Company., New York, 1992.
[TB06]
Parisa Tabriz and Nikita Borisov. Breaking the collu-
sion detection mechanism of morphmix. In George
Danezis and Philippe Golle, editors,
Privacy Enhancing
Technologies
, volume 4258 of
Lecture Notes in Computer
Science
, pages 368-383. Springer, 2006.
[TL05]
Tommaso Toffoli and Lev B. Levitin. Specific ergodicity:
an informative indicator for invertible computational
media. In Bagherzadeh et al. [BVR05], pages 52-58.
[TM87]
Tommaso Toffoli and Norman Margolus.
Cellular Au-
tomata Machines
. MIT Press, London, 1987.
[Tof77a]
T. Toffoli.
Cellular AutomataMechanics
. PhD thesis, The
University of Michigan, 1977.
Toffoli's demonstration of reversible universal computa-
tion.
[Tof77b]
Tommaso Toffoli. Computation and construction uni-
versality of reversible cellular automata.
Journal of
Computer and System Sciences
, 15:213-231, 1977.
[TRHTA06] Mercan Topkara, Guiseppe Riccardi, Dilek Hakkani-Tur,
and Mikhail J. Atallah. Natural language watermark-
ing: Challenges in building a practical system. In
Pro-
ceedings of the SPIE International Conference on Secu-
rity, Steganography, and Watermarking of Multimedia
Contents
, January 2006.
[TTA06]
Umut Topkara, Mercan Topkara, and Mikhail J. Atal-
lah. The hiding virtues of ambiguity: quantifiably re-
silient watermarking of natural language text through
synonym substitutions.
In
MM&Sec '06: Proceedings