Author of the publication

A Progress Report on Subliminal-Free Channels.

, , , , , and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 157-168. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)On zero-knowledge proofs (extended abstract): "from membership to decision"., , and . STOC, page 255-264. ACM, (2000)An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)A proposal for the privacy leakage verification tool for Android application developers., and . ICUIMC, page 54. ACM, (2013)Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 83-94. Springer, (2014)Distributed Paillier Cryptosystem without Trusted Dealer., and . WISA, volume 6513 of Lecture Notes in Computer Science, page 44-60. Springer, (2010)A Probabilistic Method for Detecting Anomalous Program Behavior., , and . WISA, volume 3325 of Lecture Notes in Computer Science, page 87-98. Springer, (2004)Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party., , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 265-279. Springer, (2003)Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 178-190. Springer, (2000)