-
2
-
-
84862387529
-
-
June
-
E4m Disk Encryption, http://www.e4m.net, June 2003.
-
(2003)
E4m Disk Encryption
-
-
-
4
-
-
84862387722
-
-
Pgpdisk, Mar.
-
Pgpdisk, http://www.pgpi.org/products/pgpdisk/, Mar. 2004.
-
(2004)
-
-
-
5
-
-
0003508558
-
-
Nat'l Inst. of Science and Technology, FIPS 197
-
Advanced Encryption Standard. Nat'l Inst. of Science and Technology, FIPS 197, 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
6
-
-
0344379339
-
-
Nat'l Inst. of Science and Technology, FIPS 180-2
-
Secure Hashing Algorithm. Nat'l Inst. of Science and Technology, FIPS 180-2, 2001.
-
(2001)
Secure Hashing Algorithm
-
-
-
7
-
-
0012543218
-
The steganographic file system
-
D. Aucsmith, ed., Apr.
-
R. Anderson, R. Needham, and A. Shamir, "The Steganographic File System," Proc. Information Hiding, Second Int'l Workshop, D. Aucsmith, ed., Apr. 1998.
-
(1998)
Proc. Information Hiding, Second Int'l Workshop
-
-
Anderson, R.1
Needham, R.2
Shamir, A.3
-
12
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
Feb.
-
N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, pp. 26-34, Feb. 1998.
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
14
-
-
0036206373
-
Bestpeer: A self-configurable peer-to-peer system
-
Apr. (Poster Paper)
-
W.S. Ng, B.C. Ooi, and K.L. Tan, "Bestpeer: A Self-Configurable Peer-to-Peer System," Proc. 18th Int'l Conf. Data Eng., p. 272, Apr. 2002. (Poster Paper).
-
(2002)
Proc. 18th Int'l Conf. Data Eng.
, pp. 272
-
-
Ng, W.S.1
Ooi, B.C.2
Tan, K.L.3
-
15
-
-
0345359164
-
StegFS: A steganographic file system
-
Mar.
-
H. Pang, K.L. Tan, and X. Zhou, "StegFS: A Steganographic File System," Proc. 19th Int'l Conf. Data Eng., pp. 657-668, Mar. 2003.
-
(2003)
Proc. 19th Int'l Conf. Data Eng.
, pp. 657-668
-
-
Pang, H.1
Tan, K.L.2
Zhou, X.3
-
16
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Apr.
-
M.O. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
18
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
G. Simmons, "The Prisoners' Problem and the Subliminal Channel," Proc. CRYPTO '83 Conf., pp. 51-67, 1984.
-
(1984)
Proc. CRYPTO '83 Conf.
, pp. 51-67
-
-
Simmons, G.1
-
19
-
-
84908297782
-
Audio watermarking and data embedding - Current state of the art, challenges and future directions
-
Sept.
-
M.D. Swanson, B. Zhu, and A.H. Tewfik, "Audio Watermarking and Data Embedding - Current State of the Art, Challenges and Future Directions," Proc. Multimedia and Security - Workshop at ACM Multimedia '98, Sept. 1998.
-
(1998)
Proc. Multimedia and Security - Workshop at ACM Multimedia '98
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
21
-
-
3042514781
-
Improving and cryptanalysis of a key recovery system
-
Y. Yang, F. Bao, and R. Deng, "Improving and Cryptanalysis of a Key Recovery System," Proc. 2002 Australasian Conf. Information Security and Privacy, pp. 17-24, 2002.
-
(2002)
Proc. 2002 Australasian Conf. Information Security and Privacy
, pp. 17-24
-
-
Yang, Y.1
Bao, F.2
Deng, R.3
|