The Research on Information Hiding Based on Command Sequence of FTP Protocol
暂无分享,去创建一个
[1] Abhishek Singh,et al. Malicious ICMP Tunneling: Defense against the Vulnerability , 2003, ACISP.
[2] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[3] J. Postel,et al. File transfer protocol (FTP) , 1985 .
[4] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[5] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[6] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .