Applied Cryptography and Network Security
From MaRDI portal
Publication:4680935
DOI10.1007/B98360zbMATH Open1103.68549OpenAlexW4301861138MaRDI QIDQ4680935FDOQ4680935
Authors: Shiqu Li, Wei Ming Zhang
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (7)
- Security levels in steganography -- insecurity does not imply detectability
- Steganalysis of StegoStorage system
- On noise synchronization analysis in steganography using stochastic modulation
- Security of steganographic systems
- On steganographic system selection rule
- An Epistemological Approach to Steganography
- Title not available (Why is that?)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680935)