Steganographic safety layer over IP
暂无分享,去创建一个
[1] Frank Schiller,et al. Residual Error Probability of Embedded CRC by Stochastic Automata , 2010, SAFECOMP.
[2] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[3] Wen-Shyen Chen,et al. Fast calculation algorithm of the undetected errors probability of CRC codes , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[4] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[5] Chen Li,et al. Study on PROFIBUS Frame Transmission Time Property , 2009, 2009 Second International Conference on Information and Computing Science.
[6] B. Bouman,et al. SIL classification for intelligent motor control systems in accordance with the ATEX directive , 2008, 2008 5th Petroleum and Chemical Industry Conference Europe - Electrical and Instrumentation Applications.
[7] Craig Partridge,et al. Performance of checksums and CRC's over real data , 1998, IEEE/ACM Trans. Netw..
[8] Robert C. Newman. Covert computer and network communications , 2007, InfoSecCD '07.
[9] Gam D. Nguyen. Fast CRCs , 2009, IEEE Transactions on Computers.
[10] Zhijie Jerry Shi,et al. Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[11] Corrinne Pellillo Brase,et al. Understandable Statistics: Concepts and Methods , 1978 .
[12] Xiamu Niu,et al. A Normal-Traffic Network Covert Channel , 2009, 2009 International Conference on Computational Intelligence and Security.
[13] R. Marfievici,et al. Industrial Control Communication Framework on an IPv6 Infrastructure , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[14] Henrik Tobias Brodtkorb. A Safety Layer for Foundation Fieldbus , 2001 .
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[17] Arijit Sur,et al. Detection of Packet Length Based Network Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[18] Craig Partridge,et al. Performance of checksums and CRCs over real data , 1995, SIGCOMM '95.
[19] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[20] Mats Björkman,et al. Exploring Network Security in PROFIsafe , 2009, SAFECOMP.
[21] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[22] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .