StegTorrent: A Steganographic Method for the P2P File Sharing Service
暂无分享,去创建一个
[1] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[2] Janardhan R. Iyengar,et al. Low Extra Delay Background Transport (LEDBAT) , 2012, RFC.
[3] Sy-Yen Kuo,et al. Introducing P2P architecture in adaptive covert communication system , 2009, 2009 First Asian Himalayas International Conference on Internet.
[4] C. Pandu Rangan,et al. Steganographic Communication in Ordered Channels , 2006, Information Hiding.
[5] Roger Wattenhofer,et al. Hidden communication in P2P networks Steganographic handshake and broadcast , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[7] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[8] Deepa Kundur,et al. Practical Internet Steganography : Data Hiding in IP , 2003 .
[9] Wojciech Mazurczyk,et al. What more can be learnt about BitTorrent from meta-data files and μTorrent logs? , 2011, ArXiv.
[10] Timothy Roscoe,et al. Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.
[11] Xingming Sun,et al. A Steganography Scheme in P2P Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] Xiapu Luo,et al. Robust Network Covert Communications Based on TCP and Enumerative Combinatorics , 2012, IEEE Transactions on Dependable and Secure Computing.
[13] Wojciech Mazurczyk,et al. VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..
[14] D. H. Lehmer. Teaching combinatorial tricks to a computer , 1960 .