Author:
Shukla Varun,Misra Manoj Kumar,Chaturvedi Atul
Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Shukla, V., Chaturvedi, A., & Srivastava, N. (2020). A secure stop and wait communication protocol for disturbed networks. Wireless Personal Communications, 110, 861–872. https://doi.org/10.1007/s11277-019-06760-w
2. Menezes, A. J., Oorschot, P. C. V., & Vanstone, S. A. (2001). Handbook of applied cryptography (5th ed.). USA: CRC Press Inc.
3. Stallings, W. (2005). Cryptography and network security, principles and practices (7th ed.). Prentice Hall.
4. Ogiela, M. R., & Koptyra, K. (2015). False and multi-secret steganography in digital images. Soft Computing, 19, 3331–3339. https://doi.org/10.1007/s00500-015-1728-z
5. Zielińska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in steganography. Communications of the ACM, 57(3), 86–95. https://doi.org/10.1145/2566590.2566610