Transmission of Large Information through KAP Using Non-Abelian Group
暂无分享,去创建一个
[1] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[2] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[3] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[4] Ratna Dutta,et al. Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..
[5] E. Artin. The theory of braids. , 1950, American scientist.
[6] André Pimenta Freire,et al. Video steganography for confidential documents: integrity, privacy and version control , 2008, SIGDOC '08.
[7] Andreas Uhl,et al. Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.
[8] William Puech,et al. DCT-Based Watermarking Method using Error Correction Coding , 2003 .
[9] V. Pless. Introduction to the Theory of Error-Correcting Codes , 1991 .
[10] Abhishek Dwivedi,et al. A NON-REPUDIABLE BIASED BITSTRING KEY-AGREEMENT PROTOCOL WITHROOT PROBLEM IN NON-ABELIAN GROUP , 2010 .
[11] Atul Chaturvedi,et al. An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups , 2008, Int. J. Netw. Secur..
[12] Raphael Overbeck,et al. Post-Quantum Signatures , 2004, IACR Cryptol. ePrint Arch..
[13] William Puech,et al. Crypto-Compression System for Secure Tranfer of Medical Images , 2004 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[16] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[17] Sheeva Afshan,et al. Using compression algorithms to support the comprehension of program traces , 2010, WODA '10.