Audio and Optical Cryptography
暂无分享,去创建一个
[1] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Giovanni Di Crescenzo,et al. Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[6] S.J. Elliott,et al. Active noise control , 1993, IEEE Signal Processing Magazine.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] R. A. Phillips,et al. Contemporary Optics for Scientists and Engineers , 1977 .
[9] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.