Author:
Lou Der-Chyuan,Yin Te-Lung
Subject
Hardware and Architecture,Information Systems,Software
Reference25 articles.
1. Cryptographic solution to a problem of access control in a hierarchy;Akl;ACM Transactions on Computer Systems,1983
2. On the limits of steganography;Anderson;IEEE Journal on Selected Areas in Communications,1998
3. Converting boundary representations to exact bintrees;Bao;Computers in Industry,1998
4. Techniques for data hiding;Bender;IBM Systems Journal,1996
5. Copyright labeling of digitized image data;Burgett;IEEE Communications Magazine,1998
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献