INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY
暂无分享,去创建一个
[1] Wen-Guey Tzeng. Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations , 1999, Inf. Process. Lett..
[2] T. Austin,et al. Architectural support for fast symmetric-key cryptography , 2000, ASPLOS IX.
[3] R. Sakthi Vignesh,et al. Limitations of Quantum & the Versatility of Classical Cryptography: A Comparative Study , 2009, 2009 Second International Conference on Environmental and Computer Science.
[4] Miodrag Potkonjak,et al. Hiding Data in DNA , 2002, Information Hiding.
[5] J. Hessels,et al. INTERNATIONAL ENTREPRENEURSHIP: VALUE CREATION ACROSS NATIONAL BORDERS This book investigates antecedents and outcomes of international entrepreneurship. , 2008 .
[6] Alex Biryukov,et al. An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Glenn K. Manacher,et al. A New Linear-Time ``On-Line'' Algorithm for Finding the Smallest Initial Palindrome of a String , 1975, JACM.
[9] Stefan H. Thomke,et al. Experimentation Matters: Unlocking the Potential of New Technologies for Innovation , 2003 .
[10] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[12] Azzedine Boukerche,et al. A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[13] F. Crick,et al. Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid , 1974, Nature.
[14] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.
[15] Todd M. Austin,et al. Architectural support for fast symmetric-key cryptography , 2000, SIGP.
[16] Sungwon Sohn,et al. Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human , 2009 .
[17] Herbert S. Lin. Cryptography and public policy , 1998 .
[18] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[19] Simon J. D. Phoenix,et al. Cryptography, trusted third parties and escrow , 1997 .
[20] Steven M. Bellovin,et al. An attack on the Interlock Protocol when used for authentication , 1994, IEEE Trans. Inf. Theory.
[21] Eantrepreneurship. American Journal of Small Business , 1976 .
[22] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[23] James V. Stone. Independent Component Analysis: A Tutorial Introduction , 2007 .
[24] Bin Deng,et al. BinText steganography based on Markov state transferring probability , 2009, ICIS.
[25] W. Gartner. “Who Is an Entrepreneur?” Is the Wrong Question , 1988 .
[26] Frances M. T. Brazier,et al. Designing creative artificial systems , 2004, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.
[27] Chris Styles,et al. Opportunities for marketing researchers in international entrepreneurship , 2006 .
[28] Paul Thagard,et al. The AHA! Experience: Creativity Through Emergent Binding in Neural Networks , 2011, Cogn. Sci..
[29] Guillermo A. Francia,et al. Steganography obliterator: an attack on the least significant bits , 2006, InfoSecCD '06.
[30] E. Autio. Creative tension: the significance of Ben Oviatt's and Patricia McDougall's article ‘toward a theory of international new ventures’ , 2005 .
[31] Michael Willett. Cryptography old and new , 1982, Comput. Secur..
[32] Thomas Wollinger,et al. Fundamentals of Symmetric Cryptography , 2006 .
[33] Yong Se Kim,et al. Creativity: Simulation, stimulation, and studies , 2010, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.
[34] Richard C. T. Lee,et al. Data hiding methods based upon DNA sequences , 2010, Inf. Sci..
[35] Hossein Rouhani Zeidanloo,et al. Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.
[36] Andreea Zamfir,et al. Using a computer-based model for developing business students' skills: case study on the regional application of the model , 2011 .
[37] Sattar J Aboud,et al. An efficient method for attack RSA scheme , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.
[38] Arshad M. Khan,et al. Innovative and Noninnovative Small Firms: Types and Characteristics , 1989 .
[39] Vanessa Ratten,et al. Mobile Banking Innovations and Entrepreneurial Adoption Decisions , 2011, Int. J. E Entrepreneurship Innov..
[40] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[41] Tal Mor,et al. Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment , 2006, Theor. Comput. Sci..
[42] P. P. McDougall,et al. Toward a Theory of International New ventures , 1994 .
[43] Xiang Li. Entrepreneurial competencies as an entrepreneurial distinctive: An examination of the competency approach in defining entrepreneurs , 2009 .
[44] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[45] A Leier,et al. Cryptography with DNA binary strands. , 2000, Bio Systems.