메뉴 건너뛰기




Volumn 16, Issue 4, 1998, Pages 452-462

The history of subliminal channels

Author keywords

Communication system security; Cryptography; Data security; Nuclear weapons; Protocols; Steganography; Subliminal channels; Treaty verification

Indexed keywords

CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; DIGITAL SIGNAL PROCESSING; MILITARY COMMUNICATIONS; NETWORK PROTOCOLS; REDUNDANCY; SECURITY OF DATA;

EID: 0032075057     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/49.668969     Document Type: Review
Times cited : (56)

References (3)
  • 1
    • 0028463501 scopus 로고
    • Subliminal channels: Past and present
    • July/Aug.
    • G. J. Simmons. "Subliminal channels: Past and present." Eur. Trans. Telecommun., vol. 5, no. 4, pp. 459-473, July/Aug. 1994.
    • (1994) Eur. Trans. Telecommun. , vol.5 , Issue.4 , pp. 459-473
    • Simmons, G.J.1
  • 2
    • 0347909349 scopus 로고
    • How to insure that data acquired to verify treaty compliance are trustworthy
    • New York: IEEE Press
    • _, "How to insure that data acquired to verify treaty compliance are trustworthy," Contemporary Cryptology - The Science of Information Integrity. New York: IEEE Press, 1992.
    • (1992) Contemporary Cryptology - The Science of Information Integrity
  • 3
    • 84955579478 scopus 로고    scopus 로고
    • The Newton channel
    • Proc. 1st Int. Workshop on Information Hiding, Cambridge, U.K., May/June
    • R. J. Anderson, S. Vaudenay, B. Preneel, and K. Nyberg, "The Newton channel," in Proc. 1st Int. Workshop on Information Hiding, Cambridge, U.K., Springer Lecture Notes in Computer Science, vol. 1174, May/June, 1996, pp. 151-156.
    • (1996) Springer Lecture Notes in Computer Science , vol.1174 , pp. 151-156
    • Anderson, R.J.1    Vaudenay, S.2    Preneel, B.3    Nyberg, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.