The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
1996 (conf/ih/1996)

  1. David Kahn
    The History of Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:1-5 [Conf]
  2. Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand
    Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:7-21 [Conf]
  3. Theodore G. Handel, Maxwell T. Sandford II
    Hiding Data in the OSI Network Model. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:23-38 [Conf]
  4. Ross J. Anderson
    Stretching the Limits of Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:39-48 [Conf]
  5. Birgit Pfitzmann
    Trials of Traced Traitors. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:49-64 [Conf]
  6. Yvo Desmedt
    Establishing Big Broth Using Covert Channals and Other Covert Techniques. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:65-71 [Conf]
  7. Catherine Meadows, Ira S. Moskowitz
    Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:73-93 [Conf]
  8. Mark S. Anderson, Maris A. Ozols
    Covert Channel Analysis for Stubs. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:95-113 [Conf]
  9. Ian W. Jackson
    Anonymous Addresses and Confidentiality of Location. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:115-120 [Conf]
  10. Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    MIXes in Mobile Communication Systems: Location Management with Privacy. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:121-135 [Conf]
  11. David M. Goldschlag, Michael G. Reed, Paul F. Syverson
    Hiding Routing Information. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:137-150 [Conf]
  12. Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg
    The Newton Channel. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:151-156 [Conf]
  13. Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung
    A Progress Report on Subliminal-Free Channels. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:157-168 [Conf]
  14. Steven H. Low, Nicholas F. Maxemchuk
    Modeling Cryptographic Protocols and Their Collusion Analysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:169-184 [Conf]
  15. Ingemar J. Cox, Joe Kilian, Frank Thomson Leighton, Talal Shamoon
    A Secure, Robust Watermark for Multimedia. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:185-206 [Conf]
  16. Joshua R. Smith, Barrett O. Comiskey
    Modulation and Information Hiding in Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:207-226 [Conf]
  17. Jack Brassil, Lawrence O'Gorman
    Watermarking Document Images with Bounding Box Expansion. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:227-235 [Conf]
  18. Gustavus J. Simmons
    The History of Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:237-256 [Conf]
  19. Kouichi Sakurai, Yoshinori Yamane
    Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:257-264 [Conf]
  20. Tuomas Aura
    Practical Invisibility in Digital Communication. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:265-278 [Conf]
  21. Paul Davern, Michael Scott
    Fractal Based Image Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:279-294 [Conf]
  22. Daniel Gruhl, Anthony Lu, Walter Bender
    Echo Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:293-315 [Conf]
  23. David Aucsmith
    Tamper Resistant Software: An Implementation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:317-333 [Conf]
  24. Matt Blaze
    Oblevious Key Escrow. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:335-343 [Conf]
  25. Thomas A. Berson
    HMOS: Her Mayesty's Orthography Service. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:345- [Conf]
  26. Birgit Pfitzmann
    Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:347-350 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002