Academic literature on the topic 'Subliminal channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Subliminal channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Subliminal channel"
Rosario, Hector. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208. http://dx.doi.org/10.2307/4146896.
Full textRosario, Héctor. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208–12. http://dx.doi.org/10.1080/07468342.2004.11922074.
Full textKoptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.
Full textHarn, L., and G. Gong. "Digital signature with a subliminal channel." IEE Proceedings - Computers and Digital Techniques 144, no. 6 (1997): 387. http://dx.doi.org/10.1049/ip-cdt:19971511.
Full textNarn-Yih Lee and Pei-Hsiu Ho. "Digital signature with a threshold subliminal channel." IEEE Transactions on Consumer Electronics 49, no. 4 (2003): 1240–42. http://dx.doi.org/10.1109/tce.2003.1261223.
Full textCetnarski, Ryszard, Alberto Betella, Hielke Prins, Sid Kouider, and Paul F. M. J. Verschure. "Subliminal Response Priming in Mixed Reality: The Ecological Validity of a Classic Paradigm of Perception." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 1–17. http://dx.doi.org/10.1162/pres_a_00171.
Full textLi, Su, Cui Guohua, Yang Muxiang, and Chen Jing. "Threshold subliminal channel based on designated verifier signature." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1485–88. http://dx.doi.org/10.1007/bf02831803.
Full textZhou, Xuan Wu, and Yan Fu. "Optimized E-Cash Scheme and its Formal Analysis." Advanced Materials Research 204-210 (February 2011): 1322–25. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1322.
Full textLee, Narn-Yih, and Shu-Ya Yang. "The design of integrating subliminal channel with access control." Applied Mathematics and Computation 171, no. 1 (2005): 573–80. http://dx.doi.org/10.1016/j.amc.2005.01.071.
Full textAnjan, K., N. K. Srinath, and Abraham Jibi. "ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SECURED COMMUNICATION." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 39–53. https://doi.org/10.5281/zenodo.8252269.
Full textDissertations / Theses on the topic "Subliminal channel"
Коваленко, Богдан Анатолiйович, та Bohdan Kovalenko. "Методи побудови клептографiчних механiзмiв та систем стiйких до клептографiчних модифiкацiй". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44188.
Full textChang, Chia-Feng, and 張佳峰. "Public-Key Based Subliminal and Subliminal-Free Channel." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/48029264762209468220.
Full text楊淑雅. "Research and design of new subliminal channel technology." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/57099822742484155165.
Full textHo, Pei-Hsiu, and 何佩修. "The Study of Digital Signature with a Subliminal Channel." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/89495170847100813068.
Full textChen, Chien-Hung, and 陳建宏. "Using Subliminal Channel Mechanism to Defend Against the Insider Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/52904837083392712115.
Full textYang, Chao-Lin, and 楊朝麟. "Asymmetric Subliminal Channels in Digital Signatures." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/03741747045365531926.
Full textHung, Jia-Jung, and 洪嘉駿. "Subliminal Channels in the Ring Signature." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/55382818800961605320.
Full textLin, Dai-Rui, and 林岱銳. "Multiple Subliminal Channels and Chameleon Hash Functions and Their Applications." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/84963396637494970360.
Full textBooks on the topic "Subliminal channel"
Joyce, Shulman, and Rafferty Gerald P, eds. Subliminal: The new channel to personal power. InfoBooks, 1990.
Find full textPouvoir Subliminal: Changez de Vision... Changez de Vie. Independently Published, 2020.
Find full textGaneri, Jonardon. The Disunity of Mind. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198757405.003.0009.
Full textCyna, Allan M., Suyin GM Tan, Marion I. Andrew, Laura L. Burgoyne, and Scott W. Simmons, eds. Handbook of Communication in Anaesthesia, Pain Management, and Intensive Care. 2nd ed. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/med/9780198858669.001.0001.
Full textBook chapters on the topic "Subliminal channel"
Zhao, Xianfeng, and Ning Li. "Reversible Watermarking with Subliminal Channel." In Information Hiding. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88961-8_9.
Full textKobara, Kazukuni, and Hideki Imai. "On the Channel Capacity of Narrow-Band Subliminal Channels." In Information and Communication Security. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_26.
Full textYoung, Adam, and Moti Yung. "A Subliminal Channel in Secret Block Ciphers." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_14.
Full textTeşeleanu, George. "Subliminal Hash Channels." In Algebra, Codes and Cryptology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36237-9_9.
Full textSimmons, Gustavus J. "The history of subliminal channels." In Information Hiding. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61996-8_44.
Full textBurmester, Mike, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, and Moti Yung. "A progress report on subliminal-free channels." In Information Hiding. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61996-8_39.
Full textBohli, Jens-Matthias, and Rainer Steinwandt. "On Subliminal Channels in Deterministic Signature Schemes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496618_14.
Full textGururaja, H. S., M. Seetha, and Anjan K. Koundinya. "Covertness Analysis of Subliminal Channels in Legitimate Communication." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29280-4_68.
Full textKobara, Kazukuni, and Hideki Imai. "Self-synchronized message randomization methods for subliminal channels." In Information and Communications Security. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028488.
Full textSakurai, Kouichi, and Toshiya Itoh. "Subliminal channels for signature transfer and their application to signature distribution schemes." In Advances in Cryptology — AUSCRYPT '92. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57220-1_65.
Full textConference papers on the topic "Subliminal channel"
Hartl, Alexander, Robert Annessi, and Tanja Zseby. "A Subliminal Channel in EdDSA." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139923.3139925.
Full textXuanwu Zhou and Ping Wei. "Threshold signature scheme with subliminal channel." In 2009 Chinese Control and Decision Conference (CCDC). IEEE, 2009. http://dx.doi.org/10.1109/ccdc.2009.5192262.
Full textYang, Cheng, Jianbo Liu, and Yaqing Niu. "Robust Watermark Model Based on Subliminal Channel." In 2007 International Conference on Computational Intelligence and Security (CIS 2007). IEEE, 2007. http://dx.doi.org/10.1109/cis.2007.63.
Full textWang, Jianhui, and Tao Yang. "Subliminal Channel and Digital Currency Pay Security." In 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2018. http://dx.doi.org/10.1109/icitbs.2018.00041.
Full textXiangjun, Xin, and Li Qingbo. "Construction of Subliminal Channel in ID-Based Signatures." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.90.
Full textZhang, Jian-hong, Peng-yan Li, and Xu-bing Zhao. "A novel group signature scheme with subliminal channel." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0072.
Full textXin Xiangjun and Zhi Guizhen. "A New Digital Signature Scheme with Threshold Subliminal Channel." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.86.
Full textZhou, Xuanwu. "Threshold Cryptosystem and Its Application in Subliminal Channel Scheme." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.85.
Full textWang, Zhenyou, Wei Gao, Li'e Chen, and Fei Li. "Perfect Subliminal Channel in a Paring-Based Digital Signature." In 2009 International Conference on Computational Intelligence and Security. IEEE, 2009. http://dx.doi.org/10.1109/cis.2009.24.
Full textSu, Li, Muxiang Yang, Jun Li, and Guohua Cui. "Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments." In 2006 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2006. http://dx.doi.org/10.1109/wicom.2006.202.
Full text