Author:
Desmedt Yvo,Hou Shuang,Quisquater Jean -Jacques
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Blakley, G. R.: Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc. (1979) pp. 313–317
2. Lect Notes Comput Sci;Y. Desmedt,1994
3. Desmedt, Y. and Hou, S. and Quisquater, J.J.: Cerebral Cryptography. Workshop on information hiding, Preproceedings, April 15–17, 1998, Portland, Oregon, USA.
4. Franz, E., Jerichow, A., Möller, S., Pfitzmann, A. and Stierand, I.: Computer Based Steganography: How it works why therefore any restrictions on cryptography are nonsense, at best. Information Hiding, Proceedings, 1996, pp.3–21.
5. Kurak, C., McHugh, J.: A cautionary note on image downgrading. In Proceedings of the 8th Computer Security Applications Conference(December1992)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献