-
1
-
-
84863139285
-
-
Internet, August Available: September 2011
-
Wikipedia Encyclopedia, "Cloud storage," Internet, August 2011, Available: http://en.wikipedia.org/wiki/Cloud-storage. September 2011
-
(2011)
Cloud Storage
-
-
-
2
-
-
84899075019
-
-
Internet, Available: September
-
J. Strickland, "How Cloud Storage Works," Internet, Available: http://computer.howstuffworks.com/cloud-computing/cloud-storage.htm. September 2011
-
(2011)
How Cloud Storage Works
-
-
Strickland, J.1
-
3
-
-
84863156280
-
Understanding Security in Cloud Storage
-
NASUAI
-
NASUAI, "Understanding Security in Cloud Storage", A NASUNI WHITE PAPER, 2010
-
(2010)
A Nasuni White Paper
-
-
-
4
-
-
79957798876
-
-
Microsoft June
-
A. Marshall, M. Howard, G. Bugher, B. Harden, "Security Best Practices For Developing Windows Azure Applications," Microsoft, June 2010
-
(2010)
Security Best Practices for Developing Windows Azure Applications
-
-
Marshall, A.1
Howard, M.2
Bugher, G.3
Harden, B.4
-
5
-
-
84863121797
-
-
Internet, October Available: September
-
Black Hat Team, "[GET] Amazon S3 Ripper," Internet, October 2009, Available: http://www.blackhatteam.com/f51/get-amazon-s3-ripper-9770.html, September 2011
-
(2009)
[GET] Amazon S3 Ripper
-
-
-
6
-
-
84863121796
-
-
Internet, Available: September
-
NASUAI, "Storage Services Overview," Internet, Available: http://www.nasuni.com/product/product-overview/, September 2011
-
(2011)
Storage Services Overview
-
-
-
9
-
-
8844280060
-
Quantitative evaluation of pairs and RS steganalysis
-
Andrew D. Ker, "Quantitative evaluation of pairs and RS steganalysis,"Proceedings of the SPIE, Volume 5306, pp. 83-97, 2004
-
(2004)
Proceedings of the SPIE
, vol.5306
, pp. 83-97
-
-
Ker, A.D.1
-
10
-
-
76649132033
-
Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
-
Hindawi
-
Mustafa Ulutas, Vasif V. Nabiyev, and Guzin Ulutas, "Improvements in Geometry-Based Secret Image Sharing Approach with Steganography, "Mathematical Problems in Engineering, Hindawi, 2009
-
(2009)
Mathematical Problems in Engineering
-
-
Ulutas, M.1
Nabiyev, V.V.2
Ulutas, G.3
-
11
-
-
77958025578
-
Application of T-code, turbo codes and pseudo-random sequence for steganography
-
Anil Kumar, and Navin Rajpal, "Application of T-code, turbo codes and pseudo-random sequence for steganography," Joumal of Computer Science, pp.148-153, 2006
-
(2006)
Joumal of Computer Science
, pp. 148-153
-
-
Kumar, A.1
Rajpal, N.2
-
12
-
-
8844240901
-
Reliable detection of LSB steganography in color and grayscale images
-
Fridrich, J., Goljan, M., Du, R. "Reliable detection of LSB steganography in color and grayscale images," In: Proceedings of the 2001 workshop on multimedia and security: new challenges, Ottawa, Ontario, Canada, ACM, October 2001
-
Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, Ottawa, Ontario, Canada, ACM, October 2001
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
80455178199
-
Statistics detection algorithm based on audio lsb steganography
-
G. T. Juan You, "Statistics detection algorithm based on audio lsb steganography," Computer Engineering of CHINA, vol. 35(24), pp. 176-177, 2009
-
(2009)
Computer Engineering of CHINA
, vol.35
, Issue.24
, pp. 176-177
-
-
Juan You, G.T.1
-
14
-
-
84863156283
-
-
Internet, Available: September
-
EmbeddedSw, "OpenPuff Yet not another steganography SW," Internet, Available: http://embeddedsw.net/OpenPuff-Steganography-Home.html, September 2011
-
(2011)
OpenPuff Yet Not Another Steganography SW
-
-
|