Privacy Protection and Computer Forensics, Second Edition
暂无分享,去创建一个
[1] Moti Yung,et al. The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? , 1996, CRYPTO.
[2] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[3] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[4] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[5] Gregory S. Sergienko. Self Incrimination and Cryptographic Keys , 1996 .
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[10] Harold Joseph Highland,et al. Electromagnetic radiation revisited , 1986, Computers & security.
[11] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..