Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Bishop M (2003) Computer security. Addison-Wesley, Reading
2. Burmester M, Desmedt YG, Itoh T, Sakurai K, Shizuya H, Yung M (1996) A progress report on subliminal-free channels. In: Anderson R (ed) Information hiding, first international workshop, Proceedings, Cambridge, 30 May–1 June. Lecture notes in computer science, vol 1174. Springer, pp 159–168
3. Desmedt Y (1990a) Abuses in cryptography and how to fight them. In: Goldwasser S (ed) Advances in cryptology – Crypto’88, Proceedings, Santa Barbara, 21–25 Aug. Lecture notes in computer science, vol 403. Springer, pp 375–389 (57% acceptance rate)
4. Desmedt Y (1990b) Making conditionally secure cryptosystems unconditionally abuse-free in a general context. In: Brassard G (ed) Advances in cryptology – Crypto’89, Proceedings, Santa Barbara, 20–24 Aug. Lecture notes in computer science, vol 435. Springer, pp 6–16 (48% acceptance rate)
5. Desmedt Y (1996) Simmons’ protocol is not free of subliminal channels. In: Proceedings: 9th IEEE computer security foundations workshop, Kenmare, 10–12 June, pp 170–175