A covert authentication and security solution for GMOs
暂无分享,去创建一个
[1] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[2] A Leier,et al. Cryptography with DNA binary strands. , 2000, Bio Systems.
[3] Gilles Brassard,et al. Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.
[4] M. Tomita,et al. Stabilizing synthetic data in the DNA of living organisms , 2008, Systems and Synthetic Biology.
[5] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[6] J. Samuel,et al. DNA Watermarking of Infectious Agents: Progress and Prospects , 2010, PLoS pathogens.
[7] Nesir Rasool Mahmood,et al. Public Key Steganography , 2014 .
[8] Gerrit Bleumer,et al. Undeniable Signatures , 2011, Encyclopedia of Cryptography and Security.
[9] David Haughton,et al. Gene tagging and the data hiding rate , 2012 .
[10] Steven D. Galbraith,et al. Invisibility and Anonymity of Undeniable and Confirmer Signatures , 2003, CT-RSA.
[11] Masanori Arita,et al. Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.
[12] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[13] Pak Chung Wong,et al. Organic data memory using the DNA approach , 2003, CACM.
[14] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[15] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[16] Laila El Aimani,et al. On Generic Constructions of Designated Confirmer Signatures , 2009, INDOCRYPT.
[17] Nicholas Hopper,et al. Public-Key Steganography , 2003, EUROCRYPT.
[18] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[19] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[20] David Haughton,et al. BioCode: Two biologically compatible Algorithms for embedding data in non-coding and coding regions of DNA , 2012, BMC Bioinformatics.
[21] Giuseppe Ateniese. Verifiable encryption of digital signatures and applications , 2004, TSEC.
[22] Miodrag Potkonjak,et al. Hiding Data in DNA , 2002, Information Hiding.
[23] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[24] David Chaum,et al. Designated Confirmer Signatures , 1994, EUROCRYPT.
[25] Dominik Heider,et al. DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.
[26] Thomas H Segall-Shapiro,et al. Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome , 2010, Science.
[27] Jan Camenisch,et al. Confirmer Signature Schemes Secure against Adaptive Adversaries , 2000, EUROCRYPT.
[28] D. Heider,et al. DNA watermarks: A proof of concept , 2008, BMC Molecular Biology.
[29] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.