Conferences in DBLP
David Kahn The History of Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:1-5 [Conf ] Elke Franz , Anja Jerichow , Steffen Möller , Andreas Pfitzmann , Ingo Stierand Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:7-21 [Conf ] Theodore G. Handel , Maxwell T. Sandford II Hiding Data in the OSI Network Model. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:23-38 [Conf ] Ross J. Anderson Stretching the Limits of Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:39-48 [Conf ] Birgit Pfitzmann Trials of Traced Traitors. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:49-64 [Conf ] Yvo Desmedt Establishing Big Broth Using Covert Channals and Other Covert Techniques. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:65-71 [Conf ] Catherine Meadows , Ira S. Moskowitz Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:73-93 [Conf ] Mark S. Anderson , Maris A. Ozols Covert Channel Analysis for Stubs. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:95-113 [Conf ] Ian W. Jackson Anonymous Addresses and Confidentiality of Location. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:115-120 [Conf ] Hannes Federrath , Anja Jerichow , Andreas Pfitzmann MIXes in Mobile Communication Systems: Location Management with Privacy. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:121-135 [Conf ] David M. Goldschlag , Michael G. Reed , Paul F. Syverson Hiding Routing Information. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:137-150 [Conf ] Ross J. Anderson , Serge Vaudenay , Bart Preneel , Kaisa Nyberg The Newton Channel. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:151-156 [Conf ] Mike Burmester , Yvo Desmedt , Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya , Moti Yung A Progress Report on Subliminal-Free Channels. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:157-168 [Conf ] Steven H. Low , Nicholas F. Maxemchuk Modeling Cryptographic Protocols and Their Collusion Analysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:169-184 [Conf ] Ingemar J. Cox , Joe Kilian , Frank Thomson Leighton , Talal Shamoon A Secure, Robust Watermark for Multimedia. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:185-206 [Conf ] Joshua R. Smith , Barrett O. Comiskey Modulation and Information Hiding in Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:207-226 [Conf ] Jack Brassil , Lawrence O'Gorman Watermarking Document Images with Bounding Box Expansion. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:227-235 [Conf ] Gustavus J. Simmons The History of Subliminal Channels. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:237-256 [Conf ] Kouichi Sakurai , Yoshinori Yamane Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:257-264 [Conf ] Tuomas Aura Practical Invisibility in Digital Communication. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:265-278 [Conf ] Paul Davern , Michael Scott Fractal Based Image Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:279-294 [Conf ] Daniel Gruhl , Anthony Lu , Walter Bender Echo Hiding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:293-315 [Conf ] David Aucsmith Tamper Resistant Software: An Implementation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:317-333 [Conf ] Matt Blaze Oblevious Key Escrow. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:335-343 [Conf ] Thomas A. Berson HMOS: Her Mayesty's Orthography Service. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:345- [Conf ] Birgit Pfitzmann Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:347-350 [Conf ]