Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ih/ih2007.bht:"
@proceedings{DBLP:conf/ih/2007, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77370-2}, doi = {10.1007/978-3-540-77370-2}, isbn = {978-3-540-77369-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BasD07, author = {Patrick Bas and Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Practical Security Analysis of Dirty Paper Trellis Watermarking}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {174--188}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_12}, doi = {10.1007/978-3-540-77370-2\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BasD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CancelliB07, author = {Giacomo Cancelli and Mauro Barni}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {MPSteg-color: {A} New Steganographic Technique for Color Images}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_1}, doi = {10.1007/978-3-540-77370-2\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CancelliB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenFLG07, author = {Mo Chen and Jessica J. Fridrich and Jan Luk{\'{a}}s and Miroslav Goljan}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {342--358}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_23}, doi = {10.1007/978-3-540-77370-2\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenFLG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DedicJV07, author = {Nenad Dedic and Mariusz H. Jakubowski and Ramarathnam Venkatesan}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {A Graph Game Model for Software Tamper Protection}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {80--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_6}, doi = {10.1007/978-3-540-77370-2\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DedicJV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DonigusEFHJLPSTVWW07, author = {Daniel D{\"{o}}nigus and Stefan Endler and Marc Fischlin and Andreas H{\"{u}}lsing and Patrick J{\"{a}}ger and Anja Lehmann and Sergey Podrazhansky and Sebastian Schipp and Erik Tews and Sven Vowe and Matthias Walthart and Frederik Weidemann}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Security of Invertible Media Authentication Schemes Revisited}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {189--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_13}, doi = {10.1007/978-3-540-77370-2\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/DonigusEFHJLPSTVWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FontaineG07, author = {Caroline Fontaine and Fabien Galand}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {How Can Reed-Solomon Codes Improve Steganographic Schemes?}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {130--144}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_9}, doi = {10.1007/978-3-540-77370-2\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FontaineG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HofbauerH07, author = {Konrad Hofbauer and Horst Hering}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {252--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_17}, doi = {10.1007/978-3-540-77370-2\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HofbauerH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JakubowskiNPV07, author = {Mariusz H. Jakubowski and Prasad Naldurg and Vijay Patankar and Ramarathnam Venkatesan}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {96--111}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_7}, doi = {10.1007/978-3-540-77370-2\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JakubowskiNPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JohnsonF07, author = {Micah K. Johnson and Hany Farid}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Exposing Digital Forgeries Through Specular Highlights on the Eye}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {311--325}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_21}, doi = {10.1007/978-3-540-77370-2\_21}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JohnsonF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KatzenbeisserSCS07, author = {Stefan Katzenbeisser and Boris Skoric and Mehmet Utku Celik and Ahmad{-}Reza Sadeghi}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Combining Tardos Fingerprinting Codes and Fingercasting}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {294--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_20}, doi = {10.1007/978-3-540-77370-2\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KatzenbeisserSCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ker07, author = {Andrew D. Ker}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {A Fusion of Maximum Likelihood and Structural Steganalysis}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {204--219}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_14}, doi = {10.1007/978-3-540-77370-2\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Ker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KirchnerB07, author = {Matthias Kirchner and Rainer B{\"{o}}hme}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Tamper Hiding: Defeating Image Forensics}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {326--341}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_22}, doi = {10.1007/978-3-540-77370-2\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KirchnerB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KratzerD07, author = {Christian Kr{\"{a}}tzer and Jana Dittmann}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using {SVM} Classification}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {359--377}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_24}, doi = {10.1007/978-3-540-77370-2\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KratzerD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeeWL07, author = {Kwangsoo Lee and Andreas Westfeld and Sangjin Lee}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Generalised Category Attack - Improving Histogram-Based Attack on {JPEG} {LSB} Embedding}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {378--391}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_25}, doi = {10.1007/978-3-540-77370-2\_25}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeeWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LuW07, author = {Peizhong Lu and Dan Wang}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {267--278}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_18}, doi = {10.1007/978-3-540-77370-2\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Martin07, author = {Keye Martin}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Steganographic Communication with Quantum Information}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {32--49}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_3}, doi = {10.1007/978-3-540-77370-2\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Martin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NuidaHWI07, author = {Koji Nuida and Manabu Hagiwara and Hajime Watanabe and Hideki Imai}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {279--293}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_19}, doi = {10.1007/978-3-540-77370-2\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/NuidaHWI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Perez-FreireP07, author = {Luis P{\'{e}}rez{-}Freire and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Exploiting Security Holes in Lattice Data Hiding}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {159--173}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_11}, doi = {10.1007/978-3-540-77370-2\_11}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Perez-FreireP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchlauwegPM07, author = {Mathias Schlauweg and Dima Pr{\"{o}}frock and Erika M{\"{u}}ller}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {237--251}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_16}, doi = {10.1007/978-3-540-77370-2\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SchlauwegPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchonfeldW07, author = {Dagmar Sch{\"{o}}nfeld and Antje Winkler}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Reducing the Complexity of Syndrome Coding for Embedding}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {145--158}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_10}, doi = {10.1007/978-3-540-77370-2\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SchonfeldW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SolankiSM07, author = {Kaushal Solanki and Anindya Sarkar and B. S. Manjunath}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {{YASS:} Yet Another Steganographic Scheme That Resists Blind Steganalysis}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {16--31}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_2}, doi = {10.1007/978-3-540-77370-2\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SolankiSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TroncosoDDP07, author = {Carmela Troncoso and Claudia D{\'{\i}}az and Orr Dunkelman and Bart Preneel}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {220--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_15}, doi = {10.1007/978-3-540-77370-2\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangLDB07, author = {Kai Wang and Guillaume Lavou{\'{e}} and Florence Denis and Atilla Baskurt}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {50--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_4}, doi = {10.1007/978-3-540-77370-2\_4}, timestamp = {Thu, 17 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangLDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangNHZH07, author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and Meiying Huang}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {65--79}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_5}, doi = {10.1007/978-3-540-77370-2\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangNHZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YoungY07, author = {Adam L. Young and Moti Yung}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Space-Efficient Kleptography Without Random Oracles}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {112--129}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_8}, doi = {10.1007/978-3-540-77370-2\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YoungY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.