default search action
1. Information Hiding 1996: Cambridge, U.K.
- Ross J. Anderson:
Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings. Lecture Notes in Computer Science 1174, Springer 1996, ISBN 3-540-61996-8 - David Kahn:
The History of Steganography. 1-5 - Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand:
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. 7-21 - Theodore G. Handel, Maxwell T. Sandford II:
Hiding Data in the OSI Network Model. 23-38 - Ross J. Anderson:
Stretching the Limits of Steganography. 39-48 - Birgit Pfitzmann:
Trials of Traced Traitors. 49-64 - Yvo Desmedt:
Establishing Big Broth Using Covert Channals and Other Covert Techniques. 65-71 - Catherine Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. 73-93 - Mark S. Anderson, Maris A. Ozols:
Covert Channel Analysis for Stubs. 95-113 - Ian W. Jackson:
Anonymous Addresses and Confidentiality of Location. 115-120 - Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:
MIXes in Mobile Communication Systems: Location Management with Privacy. 121-135 - David M. Goldschlag, Michael G. Reed, Paul F. Syverson:
Hiding Routing Information. 137-150 - Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg:
The Newton Channel. 151-156 - Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung:
A Progress Report on Subliminal-Free Channels. 157-168 - Steven H. Low, Nicholas F. Maxemchuk:
Modeling Cryptographic Protocols and Their Collusion Analysis. 169-184 - Ingemar J. Cox, Joe Kilian, Frank Thomson Leighton, Talal Shamoon:
A Secure, Robust Watermark for Multimedia. 185-206 - Joshua R. Smith, Barrett O. Comiskey:
Modulation and Information Hiding in Images. 207-226 - Jack Brassil, Lawrence O'Gorman:
Watermarking Document Images with Bounding Box Expansion. 227-235 - Gustavus J. Simmons:
The History of Subliminal Channels. 237-256 - Kouichi Sakurai, Yoshinori Yamane:
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. 257-264 - Tuomas Aura:
Practical Invisibility in Digital Communication. 265-278 - Paul Davern, Michael Scott:
Fractal Based Image Steganography. 279-294 - Daniel Gruhl, Anthony Lu, Walter Bender:
Echo Hiding. 293-315 - David Aucsmith:
Tamper Resistant Software: An Implementation. 317-333 - Matt Blaze:
Oblevious Key Escrow. 335-343 - Thomas A. Berson:
HMOS: Her Mayesty's Orthography Service. 345 - Birgit Pfitzmann:
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. 347-350
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.