Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Fachgebiete(RVK)
Zugriff
  • 1
    UID:
    almafu_BV011034945
    Umfang: VIII, 350 S. : , Ill., graph. Darst.
    ISBN: 3-540-61996-8
    Serie: Lecture notes in computer science 1174
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Geheimnisprinzip ; Kryptologie ; Konferenzschrift ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    b3kat_BV035252723
    Umfang: 1 Online-Ressource (VIII, 350 S.) , Ill., graph. Darst.
    ISBN: 3540619968
    Serie: Lecture notes in computer science 1174
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Geheimnisprinzip ; Kryptologie ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    gbv_1649333986
    Umfang: Online-Ressource
    ISBN: 9783540495895
    Serie: Lecture Notes in Computer Science 1174
    Weitere Ausg.: ISBN 9783540619963
    Weitere Ausg.: Buchausg. u.d.T. Information hiding Berlin : Springer, 1996 ISBN 3540619968
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    RVK:
    Schlagwort(e): Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    Dazugehörige Titel
    UID:
    almafu_9959186446102883
    Umfang: 1 online resource (VIII, 364 p.)
    Ausgabe: 1st ed. 1996.
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-49589-4
    Serie: Lecture Notes in Computer Science, 1174
    Inhalt: This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
    Anmerkung: Bibliographic Level Mode of Issuance: Monograph , The history of steganography -- Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best -- Hiding data in the OSI network model -- Stretching the limits of steganography -- Trials of traced traitors -- Establishing big brother using covert channels and other covert techniques -- Covert channels—A context-based view -- Covert channel analysis for Stubs -- Anonymous addresses and confidentiality of location -- MIXes in mobile communication systems: Location management with privacy -- Hiding Routing information -- The Newton channel -- A progress report on subliminal-free channels -- Modeling cryptographic protocols and their collusion analysis -- A secure, robust watermark for multimedia -- Modulation and information hiding in images -- Watermarking document images with bounding box expansion -- The history of subliminal channels -- Blind decoding, blind undeniable signatures, and their applications to privacy protection -- Practical invisibility in digital communication -- Fractal based image steganography -- Echo hiding -- Tamper resistant software: an implementation -- Oblivious key escrow -- HMOS: Her Majesty's Orthography Service -- Information hiding terminology. , English
    In: Springer eBooks
    Weitere Ausg.: ISBN 3-540-61996-8
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9947920725002882
    Umfang: VIII, 364 p. , online resource.
    ISBN: 9783540495895
    Serie: Lecture Notes in Computer Science, 1174
    Inhalt: This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
    Anmerkung: The history of steganography -- Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best -- Hiding data in the OSI network model -- Stretching the limits of steganography -- Trials of traced traitors -- Establishing big brother using covert channels and other covert techniques -- Covert channels—A context-based view -- Covert channel analysis for Stubs -- Anonymous addresses and confidentiality of location -- MIXes in mobile communication systems: Location management with privacy -- Hiding Routing information -- The Newton channel -- A progress report on subliminal-free channels -- Modeling cryptographic protocols and their collusion analysis -- A secure, robust watermark for multimedia -- Modulation and information hiding in images -- Watermarking document images with bounding box expansion -- The history of subliminal channels -- Blind decoding, blind undeniable signatures, and their applications to privacy protection -- Practical invisibility in digital communication -- Fractal based image steganography -- Echo hiding -- Tamper resistant software: an implementation -- Oblivious key escrow -- HMOS: Her Majesty's Orthography Service -- Information hiding terminology.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540619963
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almahu_9948621358302882
    Umfang: VIII, 364 p. , online resource.
    Ausgabe: 1st ed. 1996.
    ISBN: 9783540495895
    Serie: Lecture Notes in Computer Science, 1174
    Inhalt: This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
    Anmerkung: The history of steganography -- Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best -- Hiding data in the OSI network model -- Stretching the limits of steganography -- Trials of traced traitors -- Establishing big brother using covert channels and other covert techniques -- Covert channels-A context-based view -- Covert channel analysis for Stubs -- Anonymous addresses and confidentiality of location -- MIXes in mobile communication systems: Location management with privacy -- Hiding Routing information -- The Newton channel -- A progress report on subliminal-free channels -- Modeling cryptographic protocols and their collusion analysis -- A secure, robust watermark for multimedia -- Modulation and information hiding in images -- Watermarking document images with bounding box expansion -- The history of subliminal channels -- Blind decoding, blind undeniable signatures, and their applications to privacy protection -- Practical invisibility in digital communication -- Fractal based image steganography -- Echo hiding -- Tamper resistant software: an implementation -- Oblivious key escrow -- HMOS: Her Majesty's Orthography Service -- Information hiding terminology.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662179000
    Weitere Ausg.: Printed edition: ISBN 9783540619963
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540099963?
Meinten Sie 9783540119463?
Meinten Sie 9783540114963?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz