Hiding the Hidden: A software system for concealing ciphertext as innocuous text
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. A Secure Subliminal Channel (?) , 1985, CRYPTO.
[2] Evan L. Antworth. Morphological Parsing with a Unification-based Word Grammar , 1994 .
[3] Yvo Desmedt. Subliminal-Free Authentication and Signature (Extended Abstract) , 1988, EUROCRYPT.
[4] R. Gallager. Information Theory and Reliable Communication , 1968 .
[5] A. J. Thomson,et al. A Practical English Grammar , 1967 .
[6] Tony Mason,et al. Lex & Yacc , 1992 .
[7] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[8] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[9] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[12] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[13] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] A. J. Thomson. A Practical English Grammar Fourth Edition , 1986 .