標(biāo)題: Titlebook: Information Hiding; First International Ross Anderson Conference proceedings 1996 Springer-Verlag Berlin Heidelberg 1996 Information-Hidin [打印本頁(yè)] 作者: Monsoon 時(shí)間: 2025-3-21 16:03
書目名稱Information Hiding影響因子(影響力)
書目名稱Information Hiding影響因子(影響力)學(xué)科排名
書目名稱Information Hiding網(wǎng)絡(luò)公開度
書目名稱Information Hiding網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Hiding被引頻次
書目名稱Information Hiding被引頻次學(xué)科排名
書目名稱Information Hiding年度引用
書目名稱Information Hiding年度引用學(xué)科排名
書目名稱Information Hiding讀者反饋
書目名稱Information Hiding讀者反饋學(xué)科排名
作者: 碎片 時(shí)間: 2025-3-21 22:53 作者: 十字架 時(shí)間: 2025-3-22 00:32
Covert channel analysis for Stubs,storage channels, and rely on a combination of channel elimination, reduction, and audit mechanisms. Although specific to the Stubs system, the techniques of analysis and control are adaptable to similar systems.作者: NICE 時(shí)間: 2025-3-22 05:12 作者: Truculent 時(shí)間: 2025-3-22 10:01 作者: SPALL 時(shí)間: 2025-3-22 13:40 作者: Pamphlet 時(shí)間: 2025-3-22 20:31
Anonymous addresses and confidentiality of location,We describe a scheme which will allow location information from devices like active badges to be collected by an agent controlled by the user, hiding the user‘s location from the network infrastructure, so that the user may distribute the information about their location as they see fit.作者: FLAT 時(shí)間: 2025-3-23 00:20 作者: 羊欄 時(shí)間: 2025-3-23 02:08 作者: 拘留 時(shí)間: 2025-3-23 06:43
David Kahnregulatory measures that might be applied to businesses operating in the sharing economy and its integration into existing business models in tourism. The challenges brought by this innovation raise questions about how voluntarily adopted principles of corporate sustainability and responsibility, an作者: LAVA 時(shí)間: 2025-3-23 10:51
Elke Franz,Anja Jerichow,Steffen M?ller,Andreas Pfitzmann,Ingo Stierandnational and Defence for Children-ECPAT Netherlands in Offenders on the move. Global study on sexual exploitation of children in travel and tourism, .) collected and analyzed data from all regions, and found that the travel sector has an extraordinary potential in critically intervening against huma作者: 敘述 時(shí)間: 2025-3-23 14:43 作者: 使堅(jiān)硬 時(shí)間: 2025-3-23 19:12 作者: BRIEF 時(shí)間: 2025-3-23 22:35
Birgit Pfitzmannregulatory measures that might be applied to businesses operating in the sharing economy and its integration into existing business models in tourism. The challenges brought by this innovation raise questions about how voluntarily adopted principles of corporate sustainability and responsibility, an作者: condemn 時(shí)間: 2025-3-24 06:16 作者: anarchist 時(shí)間: 2025-3-24 08:31
Catherine Meadows,Ira S. Moskowitznged and more environmentally sophisticated and industry leaders have to stay current in what is happening on all of those levels. In the not too distant future, the convergence of nanotechnology, biotechnology, and information technology will most likely impact every facet of society including medi作者: 民間傳說(shuō) 時(shí)間: 2025-3-24 11:55
Mark S. Anderson,Maris A. Ozolsiterature on the entrepreneurial ecosystem from African countries’ perspectives. We recommend that countries in Africa should focus on these variables to develop their economies in a sustainable manner and policymakers should provide an enabling environment that fosters new business opportunities.作者: 玉米棒子 時(shí)間: 2025-3-24 18:15
Ian W. Jacksontors that were found to prevent gender equality and sustainability were uneven distribution of the costs of extreme poverty, education, skill disparities, and gender stereotypes. Realistic solutions suggested are fostering the development of women as they formed the majority of a marginalised group 作者: Migratory 時(shí)間: 2025-3-24 22:38
Hannes Federrath,Anja Jerichow,Andreas Pfitzmanngy readiness, risk identification, carbon footprint analysis, supply chain and procurement factors, and financial risk quantification. As a result, to the best of our knowledge and understanding, research-based tyre recycling feasibility practices are limited and scattered. We contribute to the lite作者: blithe 時(shí)間: 2025-3-25 02:28
David M. Goldschlag,Michael G. Reed,Paul F. Syversoniterature on the entrepreneurial ecosystem from African countries’ perspectives. We recommend that countries in Africa should focus on these variables to develop their economies in a sustainable manner and policymakers should provide an enabling environment that fosters new business opportunities.作者: Tdd526 時(shí)間: 2025-3-25 06:01
Ross Anderson,Serge Vaudenay,Bart Preneel,Kaisa Nybergvate sector is recognised as a key player in bridging the gender gap in workforce participation, the private sector alone can’t lead this change. Consequently, the Ghanaian State, both as the country’s largest employer and the policymaker, must support private-sector efforts through legislation, inc作者: 大炮 時(shí)間: 2025-3-25 08:56
Mike Burmester,Yvo G. Desmedt,Toshiya Itoh,Kouichi Sakurai,Hiroki Shizuya,Moti Yungs of their core business. This indicates a high level of sustainability integration into the core business and organisation of Korean companies. Driven by formal and informal institutional forces, Korean companies are aware of the importance of sustainability, and they actively adopt sustainability 作者: phytochemicals 時(shí)間: 2025-3-25 13:48
Steven H. Low,Nicholas F. Maxemchukeasures (i.e. stakeholder management; sustainability management tools and standards; measurements)..Likewise, the chapter sets up a framework for comparing the international results, which allows positioning each country within the international context..Lastly, the reader is provided with an overvi作者: etiquette 時(shí)間: 2025-3-25 16:37 作者: fatuity 時(shí)間: 2025-3-25 21:10 作者: 變態(tài) 時(shí)間: 2025-3-26 00:30
Gustavus J. Simmonsnly compared to the overall international average but also to an alternative average excluding the German results. Possible explanations for the mediocre average positioning of the German companies are given and the potential for sustainability management is identified.作者: GUEER 時(shí)間: 2025-3-26 08:07 作者: HUMP 時(shí)間: 2025-3-26 11:41
A progress report on subliminal-free channels, problem of whether it is possible to develop (and if so, how) appropriate techniques for detecting or preventing the use of such channels. Several such techniques have already been proposed in the literature, and are suitable for many systems. We review these. We also consider recent developments, 作者: 說(shuō)明 時(shí)間: 2025-3-26 14:13
A secure, robust watermark for multimedia,ncluding dithering and recompression and rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unam作者: BRACE 時(shí)間: 2025-3-26 20:12 作者: Left-Atrium 時(shí)間: 2025-3-26 20:58
Establishing big brother using covert channels and other covert techniques, covert hardware and covert software is actually undecidable and cryptography alone seems inadequate to protect against the abuse of covert technology, extending the work of Anderson regarding the limitations of cryptography. Also, the use of covert technology to protect copyright can be abused to suppress freedom of expression.作者: Urea508 時(shí)間: 2025-3-27 01:27
Modulation and information hiding in images,tion. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called . for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.作者: laceration 時(shí)間: 2025-3-27 05:53
Conference proceedings 1996e of each other‘s existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.作者: 領(lǐng)巾 時(shí)間: 2025-3-27 13:23 作者: crockery 時(shí)間: 2025-3-27 15:45 作者: 滑動(dòng) 時(shí)間: 2025-3-27 21:21
The Newton channel,ign of the DSA does not maximise the covert utility of its signatures, but minimises them. Our construction also shows that many discrete log based systems are insecure: they operate in more than one group at a time, and key material may leak through those groups in which discrete log is easy. However, the DSA is not vulnerable in this way.作者: 擁擠前 時(shí)間: 2025-3-27 23:38
0302-9743 hop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.978-3-540-61996-3978-3-540-49589-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 陳腐的人 時(shí)間: 2025-3-28 02:48
Trials of traced traitors,at he could not have produced on his own, and that is therefore much better evidence. Examples of concrete constructions are given..We also discuss the general model of traitor tracing and propose improvements to the symmetric schemes.作者: 割公牛膨脹 時(shí)間: 2025-3-28 08:12
Modeling cryptographic protocols and their collusion analysis,e and the other the subsequent collusion phase. We derive a necessary and sufficient condition under which such collusion is possible. Based on this characterization we design an algorithm that checks whether the condition is satisfied, and when it is, computes an efficient collusion process.作者: 商業(yè)上 時(shí)間: 2025-3-28 12:00
Blind decoding, blind undeniable signatures, and their applications to privacy protection,, undetectability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.作者: mydriatic 時(shí)間: 2025-3-28 14:52 作者: altruism 時(shí)間: 2025-3-28 22:50
Conference proceedings 1996, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge..Work on information hiding has been carried out over the last few years within different research communities, mostly unawar作者: Provenance 時(shí)間: 2025-3-29 01:20
David Kahnis a disruptive influence in the tourism business, while others are acknowledging it as a potentially transformative phenomenon that has been challenging for industry, governments and researchers alike. The . describes a new economic paradigm driven by technology, consumer awareness and social comme作者: infatuation 時(shí)間: 2025-3-29 04:48 作者: Armada 時(shí)間: 2025-3-29 07:29
Theodore G. Handel,Maxwell T. Sandford IIinancial instruments; and b)?voluntary actions, such as those under the traditional CSR umbrella. The CSR 2.0 agenda extends the range of business responsibilities to include their engagement in the design of sustainability policies and governance. Drawing on the PARO framework for public engagement作者: 相一致 時(shí)間: 2025-3-29 14:10 作者: ANT 時(shí)間: 2025-3-29 19:15 作者: Blemish 時(shí)間: 2025-3-29 23:03
Yvo Desmedtal financial measures do not match entirely with the competencies and skills companies required to face today’s business environment. The complexity of managing an organization today requires “integrated management” that means managers being able to view performance in several areas simultaneously. 作者: 性行為放縱者 時(shí)間: 2025-3-30 03:36
Catherine Meadows,Ira S. Moskowitzeering, which seeks to shape the natural world to meet human needs and wants, is a body of knowledge of design and creation of human-made products and a process for solving problems (Wulf 1998). While there has been a relatively weak relationship between scientific advances and technology until the 作者: 全部 時(shí)間: 2025-3-30 06:28
Mark S. Anderson,Maris A. Ozolsgued that the entrepreneurial ecosystem is an emerging field that holds a critical role in the sustainability of Africa’s economy, such as job creation, providing decent livelihoods, utilisation of business opportunities, innovation and improving sustainability social conditions. However, entreprene作者: 包裹 時(shí)間: 2025-3-30 10:30 作者: FLIP 時(shí)間: 2025-3-30 14:33 作者: 主動(dòng)脈 時(shí)間: 2025-3-30 18:44 作者: moribund 時(shí)間: 2025-3-30 20:48 作者: PANIC 時(shí)間: 2025-3-31 03:08 作者: 健談 時(shí)間: 2025-3-31 06:07
Steven H. Low,Nicholas F. Maxemchukynopsis, the edited volume is positioned within the contemporary discussions on sustainability management..Furthermore, the chapter introduces the conceptual structure of the book chapters, the ‘Triple I’ approach, which is used to present the findings from each country in a consistent manner. The ‘作者: chronicle 時(shí)間: 2025-3-31 10:18
Ingemar J. Cox,Joe Kilian,Tom Leighton,Talal Shamoonrnational Corporate Sustainability Barometer (ICSB). Commitment from top management, corporate philosophy and self-commitment seem to drive corporate sustainability in the UK more strongly than internationally. We also find business case expectations from sustainability adoption to be higher in the 作者: 脫離 時(shí)間: 2025-3-31 16:18 作者: 威脅你 時(shí)間: 2025-3-31 18:11
Gustavus J. Simmonsults of the international average. German companies are generally perceived as comprehensively engaging in environmental and social issues. However, when analysing the results of the ICSB survey, it is striking how close German companies are to the international average rather than standing out. Non作者: Adulterate 時(shí)間: 2025-3-31 21:48
Kouichi Sakurai,Yoshinori Yamanee for change is built. Once this is established, (and bought into) the business can define its ambition and focus on the steps necessary to achieve it. The theoretical lens of the strategist is applied throughout, with core strategic principles and frameworks applied to developing a sustainability s作者: 熱心 時(shí)間: 2025-4-1 02:44
Computer based steganography: How it works and why therefore any restrictions on cryptography are nsible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation.作者: 消瘦 時(shí)間: 2025-4-1 09:55