Author:
von Ahn Luis,Hopper Nicholas J.
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)
2. Backes, M., Cachin, C.: Public-Key Steganography with Active Attacks. Cryptology ePrint Archive, Report 2003/231, November 6 (2003), Available electronically: http://eprint.iacr.org/2003/231
3. Bellare, M., Rogaway, P.: Random Oracles are Practical. In: Computer and Communications Security: Proceedings of ACM CCS 1993, pp. 62–73 (1993)
4. Lecture Notes in Computer Science;C. Cachin,1998
5. Lecture Notes in Computer Science;S. Craver,1998
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献