Cryptography and Steganography: teaching experience
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[2] Simon Singh,et al. Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2003, ACM Queue.
[3] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[4] Peter Wayner. Disappearing cryptography - being and nothingness on the net , 1996 .
[5] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[6] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[7] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[8] Ernest Hatch Wilkins. A History of Italian Literature , 1954 .
[9] Erik Winfree,et al. DNA Based Computers V , 2000 .
[10] Miodrag Potkonjak,et al. Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware , 1999, Information Hiding.
[11] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[12] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.