Hiding Message in Map Along Pre-Hamiltonian Path
暂无分享,去创建一个
[1] David T. Green,et al. A Strategy for Enterprise VoIP Security , 2009 .
[2] J. B. Thompson,et al. Ethical Elements of Security and Developments in Cyberspace that Should Promote Trust in Electronic Commerce , 2001 .
[3] Touradj Ebrahimi,et al. Steganography for Three-Dimensional Polygonal Meshes , 2002, SPIE Optics + Photonics.
[4] Mari W. Buche,et al. A Unified Information Security Management Plan , 2005 .
[5] C. Berge. The theory of graphs and its applications , 1963 .
[6] Isaac Weiss,et al. Geometric invariants and object recognition , 1993, International Journal of Computer 11263on.
[7] Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues , 2009 .
[8] Sunil Kumar Muttoo,et al. Principle of Graph Theoretic Approach to Digital Steganography , 2009 .
[9] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[10] Ram Dantu,et al. Spam Classification Based on E-Mail Path Analysis , 2008, Int. J. Inf. Secur. Priv..
[11] Frank Rubin,et al. A Search Procedure for Hamilton Paths and Circuits , 1974, JACM.
[12] J. A. Bondy,et al. Graph Theory with Applications , 1978 .
[13] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[14] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[15] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[16] T.I. Fenner,et al. On the existence of Hamiltonian cycles in a class of random graphs , 1983, Discret. Math..
[17] Isaac Weiss,et al. Review Geometric Invariants and Object Recognition , 1993 .
[18] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[19] MAX J. EGENHOFER,et al. Point Set Topological Relations , 1991, Int. J. Geogr. Inf. Sci..
[20] Vandana Sharma,et al. Overcoming 64kb data size limit in handling large spatial data in GISNIC while cleaning and building topology , 2006, Int. J. Inf. Technol. Manag..
[21] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[22] Te-Shun Chou. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances , 2011 .
[23] Vinay Kumar,et al. Relevance of Steganography, in General, and Graph Theoretic Approach in Particular, in Indian Security Concern and Measure , 2008 .
[24] Mohammad Jafar Tarokh,et al. A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents , 2009, Int. J. Inf. Secur. Priv..
[25] Vinay Kumar,et al. A data structure for graph to facilitate hiding of information in a graph's segments – a graph theoretic approach to steganography , 2009 .
[26] Sushil K. Sharma,et al. Handbook of Research on Information Security and Assurance , 2008 .
[27] Haralambos Mouratidis,et al. Information Systems Security: Cases of Network Administrator Threats , 2007, Int. J. Inf. Secur. Priv..
[28] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[29] Vinay Kumar,et al. Graph Theoretic Approach to Steganography to Secure Message Digest , 2010, Inf. Secur. J. A Glob. Perspect..
[30] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[31] Hugo Krawczyk,et al. Strengthening Digital Signatures Via Randomized Hashing , 2006, CRYPTO.
[32] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[33] David Salomon,et al. Data Privacy and Security , 2003, Springer New York.
[34] Hamid R. Nemati,et al. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .
[35] G. Dhillon. Information Security Management: Global Challenges in the New Millennium , 2000 .
[36] Béla Bollobás,et al. Almost all Regular Graphs are Hamiltonian , 1983, European journal of combinatorics (Print).
[37] Georg Disterer. Attacks on IT Systems: Categories of Motives , 2012 .
[38] Sunil Kumar Muttoo,et al. A Graph Theoretic Approach to Sustainable Steganography , 2011 .
[39] Ingemar J. Cox,et al. Information Transmission and Steganography , 2005, IWDW.