To see the other types of publications on this topic, follow the link: Subliminal channel.

Journal articles on the topic 'Subliminal channel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Subliminal channel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rosario, Hector. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208. http://dx.doi.org/10.2307/4146896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rosario, Héctor. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208–12. http://dx.doi.org/10.1080/07468342.2004.11922074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.

Full text
Abstract:
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping alg
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and G. Gong. "Digital signature with a subliminal channel." IEE Proceedings - Computers and Digital Techniques 144, no. 6 (1997): 387. http://dx.doi.org/10.1049/ip-cdt:19971511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Narn-Yih Lee and Pei-Hsiu Ho. "Digital signature with a threshold subliminal channel." IEEE Transactions on Consumer Electronics 49, no. 4 (2003): 1240–42. http://dx.doi.org/10.1109/tce.2003.1261223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cetnarski, Ryszard, Alberto Betella, Hielke Prins, Sid Kouider, and Paul F. M. J. Verschure. "Subliminal Response Priming in Mixed Reality: The Ecological Validity of a Classic Paradigm of Perception." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 1–17. http://dx.doi.org/10.1162/pres_a_00171.

Full text
Abstract:
Subliminal stimuli can affect perception, decision-making, and action without being accessible to conscious awareness. Most evidence supporting this notion has been obtained in highly controlled laboratory conditions. Hence, its generalization to more realistic and ecologically valid contexts is unclear. Here, we investigate the impact of subliminal cues in an immersive navigation task using the so-called eXperience Induction Machine (XIM), a human accessible mixed-reality system. Subjects were asked to navigate through a maze at high speed. At irregular intervals, one group of subjects was ex
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Su, Cui Guohua, Yang Muxiang, and Chen Jing. "Threshold subliminal channel based on designated verifier signature." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1485–88. http://dx.doi.org/10.1007/bf02831803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Xuan Wu, and Yan Fu. "Optimized E-Cash Scheme and its Formal Analysis." Advanced Materials Research 204-210 (February 2011): 1322–25. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1322.

Full text
Abstract:
HCC (Hyper-elliptic Curves Cryptosystem) is a typical public key cryptosystem with high efficiency and security. In the paper, we introduced HCC into the designing of e-cash schemes and presented an improved e-cash scheme with formal security analysis. The basic cryptography algorithms in e-cash are based on the complexity of HCDLP (Hyper-elliptic Curves Discrete Logarithm Problem).This designing strategy improves the efficiency for software and hardware application and effectively reinforces the security of e-cash. Dishonest users and outer adversaries can not attack secret parameters with fe
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Narn-Yih, and Shu-Ya Yang. "The design of integrating subliminal channel with access control." Applied Mathematics and Computation 171, no. 1 (2005): 573–80. http://dx.doi.org/10.1016/j.amc.2005.01.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anjan, K., N. K. Srinath, and Abraham Jibi. "ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SECURED COMMUNICATION." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 39–53. https://doi.org/10.5281/zenodo.8252269.

Full text
Abstract:
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build robust covert channel over the network. From an attacker's perspective this will ameliorate by placing multiple such trapdoors in different protocols in the rudimentary protocol stack. This leads to a u
APA, Harvard, Vancouver, ISO, and other styles
11

Du, Bangyao, Debiao He, Min Luo, Cong Peng, and Qi Feng. "The Applications of Blockchain in the Covert Communication." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–18. http://dx.doi.org/10.1155/2022/4618007.

Full text
Abstract:
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third-party central node or authority to distribute messages which leads to a lack of undetectability, antitraceability, and robustness. In recent years, there have been attempts to apply the blockchain to covert communication solutions, for the characteristics of blockchain such as decentralization, openness, and trustworthiness. In this paper, based on the analysis of the l
APA, Harvard, Vancouver, ISO, and other styles
12

Anjan, Krishnamurthy Koundinya, and Hebbur Satyanarayana Gururaja. "A typical analysis of hybrid covert channel using constructive entropy analytics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3820–26. https://doi.org/10.11591/ijece.v12i4.pp3820-3826.

Full text
Abstract:
covert timing channel is based on modulation of the timing information in the network packets in a secured communication. The delicacy of this channel is primarily viewed as single coherent channel thwart the detection from any third-party entity or network admin. The timing covert channel is strenuous to detect under many scenarios due to the intricate complexity of the channel. The exploration of timing covert channel shed light on intrinsic design aspects which elevate understanding to an advanced level. This will effectively bring out elite literature aspects of the timing covert channel f
APA, Harvard, Vancouver, ISO, and other styles
13

Xiang, Lingyun, Yuhua Xie, Gang Luo, and Weizheng Wang. "On the Existence of Subliminal Channel in Instant Messaging Systems." International Journal of Security and Its Applications 9, no. 3 (2015): 353–62. http://dx.doi.org/10.14257/ijsia.2015.9.3.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Chien‐Yuan, Chin‐Chen Chang, and Wei‐Pang Yang. "A new subliminal channel based on fiat‐Shamir's signature scheme." Journal of the Chinese Institute of Engineers 18, no. 6 (1995): 867–72. http://dx.doi.org/10.1080/02533839.1995.9677754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Tzung-Her, Wei-Bin Lee, Hsing-Bai Chen, and Chien-Lung Wang. "Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security." Symmetry 13, no. 5 (2021): 855. http://dx.doi.org/10.3390/sym13050855.

Full text
Abstract:
Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highligh
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Chin-Ling, and Ming-He Liu. "A traceable E-cash transfer system against blackmail via subliminal channel." Electronic Commerce Research and Applications 8, no. 6 (2009): 327–33. http://dx.doi.org/10.1016/j.elerap.2009.04.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Chin-Ling, and Jyun-Jie Liao. "A fair online payment system for digital content via subliminal channel." Electronic Commerce Research and Applications 10, no. 3 (2011): 279–87. http://dx.doi.org/10.1016/j.elerap.2010.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Anjan, K., N. K. Srinath, and Abraham Jibi. "Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine." International Journal of Network Security & Its Applications (IJNSA) 5, no. 6 (2013): 55–64. https://doi.org/10.5281/zenodo.5819555.

Full text
Abstract:
Computer network is unpredictable due to information warfareand is prone to various attacks. Such attacks on network compromiseson the most important attribute, the privacy. Most of such attacksare devised using special communication channel called Covert Channel".The word Covert" stands for hidden or nontransparent.Network Covert Channel is concealed communication paths within legitimatenetwork communication that clearly violates security policies laiddown. Non-transparency in covert channel is also referred to as trapdoor.A trapdoor is unintended design within legitimate communicat
APA, Harvard, Vancouver, ISO, and other styles
19

ZHANG, Qiu-yu, and Zhan-hui SUN. "Covert communication based on subliminal channel in elliptic curve digital signature algorithm." Journal of Computer Applications 30, no. 1 (2010): 196–97. http://dx.doi.org/10.3724/sp.j.1087.2010.00196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pomykała, Jacek. "ID-Based Digital Signatures with Security Enhanced Approach." Journal of Telecommunications and Information Technology, no. 4 (June 26, 2023): 146–53. http://dx.doi.org/10.26636/jtit.2009.4.1010.

Full text
Abstract:
n the paper the ID-based digital signatures with signer’s protection in case of the private key compromising is investigated. The proposed protocols have two main ingredients. First is the application of the credential system for the suitable verification key approval. Second is the application of the subliminal channel together with the interactive generation of the secret key, to obtain the increased resistance of the system against the powerful adversary. The particular interest was turned towards the significance of the deniable encryption in creation of the corresponding protocols.
APA, Harvard, Vancouver, ISO, and other styles
21

O’Keeffe, Ian R. "Soundtrack Localisation." Journal of Internationalization and Localization 2 (January 1, 2012): 36–65. http://dx.doi.org/10.1075/jial.2.03kee.

Full text
Abstract:
This paper focuses on the localisation and adaptation of one particular aspect of the computer game: the soundtrack. Sometimes bespoke, sometimes selected from commercial releases, it provides a background, supporting role in creating atmosphere and supporting the emotive state of the game space. But how often is the target market considered when selecting appropriate musical content? Is it possible to use this almost subliminal channel into the game player’s consciousness to increase his awareness of what is happening around him, and give him a feel for his character’s emotional and physical
APA, Harvard, Vancouver, ISO, and other styles
22

Riener, Andreas, Pierre Chalfoun, and Claude Frasson. "The Potential of Subliminal Information Displays to Change Driver Behavior." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 51–70. http://dx.doi.org/10.1162/pres_a_00170.

Full text
Abstract:
In the long history of subliminal messages and perception, many contradictory results have been presented. One group of researchers suggests that subliminal interaction techniques improve human–computer interaction by reducing sensory workload, whereas others have found that subliminal perception does not work. In this paper, we want to challenge this prejudice by first defining a terminology and introducing a theoretical taxonomy of mental processing states, then reviewing and discussing the potential of subliminal approaches for different sensory channels, and finally recapitulating the find
APA, Harvard, Vancouver, ISO, and other styles
23

Ritter, Walter. "Benefits of Subliminal Feedback Loops in Human-Computer Interaction." Advances in Human-Computer Interaction 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/346492.

Full text
Abstract:
A lot of efforts have been directed to enriching human-computer interaction to make the user experience more pleasing or efficient. In this paper, we briefly present work in the fields of subliminal perception and affective computing, before we outline a new approach to add analog communication channels to the human-computer interaction experience. In this approach, in addition to symbolic predefined mappings of input to output, a subliminal feedback loop is used that provides feedback in evolutionary subliminal steps. In two studies involving concentration-intensive games, we investigated the
APA, Harvard, Vancouver, ISO, and other styles
24

Qingjun, Cai, and Zhang Yuli. "Subliminal channels in the NTRU and the subliminal-free methods." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1541–44. http://dx.doi.org/10.1007/bf02831816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Simmons, G. J. "The history of subliminal channels." IEEE Journal on Selected Areas in Communications 16, no. 4 (1998): 452–62. http://dx.doi.org/10.1109/49.668969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Simmons, Gustavus J. "Subliminal channels; past and present." European Transactions on Telecommunications 5, no. 4 (2010): 459–74. http://dx.doi.org/10.1002/ett.4460050408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

GRUSHO, A. A. "On the existence of subliminal channels." Discrete Mathematics and Applications 9, no. 1 (1999): 1–6. http://dx.doi.org/10.1515/dma.1999.9.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Narn-Yih, and Pei-Hsiu Ho. "Convertible undeniable signature with subliminal channels." Applied Mathematics and Computation 158, no. 1 (2004): 169–75. http://dx.doi.org/10.1016/j.amc.2003.08.068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Simmons, G. J. "Results concerning the bandwidth of subliminal channels." IEEE Journal on Selected Areas in Communications 16, no. 4 (1998): 463–73. http://dx.doi.org/10.1109/49.668970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Safavi-Naini, R. S., and J. R. Seberry. "Error-correcting codes for authentication and subliminal channels." IEEE Transactions on Information Theory 37, no. 1 (1991): 13–17. http://dx.doi.org/10.1109/18.61124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yang, Chao-Lin, Chuan-Ming Li, and Tzonelih Hwang. "Subliminal channels in the identity-based threshold ring signature." International Journal of Computer Mathematics 86, no. 5 (2009): 753–70. http://dx.doi.org/10.1080/00207160701663315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tihanyi, Norbert. "Fault-injection based backdoors in Pseudo Random Number Generators." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 233–45. http://dx.doi.org/10.1556/012.2015.52.2.1317.

Full text
Abstract:
The main aim of this paper is to present the concept of fault-injection backdoors in Random Number Generators. Backdoors can be activated by fault-injection techniques. Presented algorithms can be used in embedded systems like smart-cards and hardware security modules in order to implement subliminal channels in random number generators.
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Dai-Rui, Chih-I. Wang, Zhi-Kai Zhang, and D. J. Guan. "A digital signature with multiple subliminal channels and its applications." Computers & Mathematics with Applications 60, no. 2 (2010): 276–84. http://dx.doi.org/10.1016/j.camwa.2010.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kutyłowski, Mirosław, and Oliwer Sobolewski. "Privacy Illusion: Subliminal Channels in Schnorr-like Blind-Signature Schemes." Applied Sciences 15, no. 5 (2025): 2864. https://doi.org/10.3390/app15052864.

Full text
Abstract:
Blind signatures are one of the key techniques of Privacy-Enhancing Technologies (PETs). They appear as a component of many schemes, including, in particular, the Privacy Pass technology. Blind-signature schemes provide provable privacy: the signer cannot derive any information about a message signed at user’s request. Unfortunately, in practice, this might be just an illusion. We consider a novel but realistic threat model where the user does not participate in the protocol directly but instead uses a provided black-box device. We then show that the black-box device may be implemented in such
APA, Harvard, Vancouver, ISO, and other styles
35

Praamstra, Peter, and Ellen Seiss. "The Neurophysiology of Response Competition: Motor Cortex Activation and Inhibition following Subliminal Response Priming." Journal of Cognitive Neuroscience 17, no. 3 (2005): 483–93. http://dx.doi.org/10.1162/0898929053279513.

Full text
Abstract:
Some widely used tasks in cognitive neuroscience depend on the induction of a response conflict between choice alternatives, involving partial activation of the incorrect response before the correct response is emitted. Although such “conflict tasks” are often used to investigate frontal-lobe-based conflict-monitoring processes, it is not known how response competition evolves in the motor cortex. To investigate the dynamics of motor cortex activation during response competition, we used a subliminal priming task that induced response competition while bypassing preresponse stage processing co
APA, Harvard, Vancouver, ISO, and other styles
36

Ching-Nung, Yang, and Laih Chi-Sung. "A note on error-correcting codes for authentication and subliminal channels." Information Processing Letters 62, no. 3 (1997): 141–43. http://dx.doi.org/10.1016/s0020-0190(97)00053-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ionică, Laura. "War Terminology and its Psychological Impact." Scientific Bulletin of the Politehnica University of Timişoara Transactions on Modern Languages 21 (April 27, 2023): 45–53. http://dx.doi.org/10.59168/pcmc1171.

Full text
Abstract:
There is a rich terminology related to war, including the field of ammunition, battle strategies or communicative approaches. Visuals play a decisive role as they convey a greater persuasive force than the words frequently used in various communication channels. Words transcend linguistic boundaries and the clear or subliminal messages conveyed by the oral or written texts inevitably influence the ordinary reader who otherwise does not have a rich culture of the way a war is waged. The present work aims to highlight the semantic richness of war terminology and its psychological load. The study
APA, Harvard, Vancouver, ISO, and other styles
38

Kobara, Kazukuni, and Hideki Imai. "The capacity of narrow-band subliminal channels in the case of successive carrier transmission." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 84, no. 1 (2000): 1–10. http://dx.doi.org/10.1002/1520-6440(200101)84:1<1::aid-ecjc1>3.0.co;2-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kobara, Kazukuni, and Hideki Imai. "An error-control method for narrow-band subliminal channels: How to embed more bits in a carrier." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 84, no. 8 (2001): 1–10. http://dx.doi.org/10.1002/ecjc.1023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Choi, Youngrak, Yongjin Yeom, and Ju-Sung Kang. "Subliminal Channels of CRYSTALS-Kyber Applicable in the Black Box Cryptographic Module and Potential Security Threats of IP Cameras." Journal of Korean Institute of Communications and Information Sciences 48, no. 6 (2023): 630–47. http://dx.doi.org/10.7840/kics.2023.48.6.630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Drabu, Onaiza. "Who Is the Muslim? Discursive Representations of the Muslims and Islam in Indian Prime-Time News." Religions 9, no. 9 (2018): 283. http://dx.doi.org/10.3390/rel9090283.

Full text
Abstract:
A cursory look at Indian prime-time news tells us much about the tone and tenor of the people associated with it. Exaggerations, hyperbole, and tempers run wild, and news anchors flail in theatrical rage. News channels and news editors display their ideological affiliations subliminally. These affiliations—a factor of personal political stances, funding bodies, and investors—lead to partisan bias in the framing of news and, in some cases, can easily translate into racial prejudice. In this paper, I examine news coverage related to Muslims in India. I study the coverage of two issues specifical
APA, Harvard, Vancouver, ISO, and other styles
42

Grusho, A. A., and E. L. Shumitskaya. "Non-interference models and subliminal channels." Discrete Mathematics and Applications 12, no. 1 (2002). http://dx.doi.org/10.1515/dma-2002-0103.

Full text
Abstract:
AbstractWe consider mathematical models of secure systems, namely, the traditional noninterference model and a probabilistic non-interference model. We demonstrate that a system can satisfy the conditions of the traditional non-interference model in presence of a subliminal channel from the high-security domain to the low-security one. We give a sufficient condition for absence of a system of subliminal channels in the automaton model.
APA, Harvard, Vancouver, ISO, and other styles
43

Anjan, K., Abraham Jibi, and Jadhav V. Mamatha. "Design of Transport Layer Based Hybrid Covert Channel Detection Engine." November 20, 2020. https://doi.org/10.5281/zenodo.4281769.

Full text
Abstract:
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel&#39;&#39;. The word ``Covert&#39;&#39; stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitimate network communication that clearly violates security policies laid down. The non-transparency in covert channel is also referred to as trapdoor. A trapdoor is unintended design within
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Chin-Ling, Kun-hao Wang, Chun-Long Fan, and Chien-Hung Chen. "An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel." Information Technology And Control 46, no. 4 (2017). http://dx.doi.org/10.5755/j01.itc.46.4.14163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Shi, Yuxi, Gowrishankar Ganesh, Hideyuki Ando, Yasuharu Koike, Eiichi Yoshida, and Natsue Yoshimura. "Galvanic Vestibular Stimulation-Based Prediction Error Decoding and Channel Optimization." International Journal of Neural Systems, August 11, 2021, 2150034. http://dx.doi.org/10.1142/s0129065721500349.

Full text
Abstract:
A significant problem in brain–computer interface (BCI) research is decoding — obtaining required information from very weak noisy electroencephalograph signals and extracting considerable information from limited data. Traditional intention decoding methods, which obtain information from induced or spontaneous brain activity, have shortcomings in terms of performance, computational expense and usage burden. Here, a new methodology called prediction error decoding was used for motor imagery (MI) detection and compared with direct intention decoding. Galvanic vestibular stimulation (GVS) was us
APA, Harvard, Vancouver, ISO, and other styles
46

Armour, Marcel, and Bertram Poettering. "Algorithm substitution attacks against receivers." International Journal of Information Security, June 21, 2022. http://dx.doi.org/10.1007/s10207-022-00596-5.

Full text
Abstract:
AbstractThis work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our work provides a unified framework that applies to any scheme where a secret key is held by the receiver; in particular, message authentication schemes (MACs), authenticated encryption (AEAD) and public key encryption (PKE). Our unified framework brings together prior work targeting MAC schemes (FSE’19) and AEAD schemes (IMACC’19); we extend prior work by showing that public key encryption may also be targeted. ASAs were initially introduced b
APA, Harvard, Vancouver, ISO, and other styles
47

GRUSHO, A. A. "Subliminal channels and information security in Computer Systems." Discrete Mathematics and Applications 8, no. 2 (1998). http://dx.doi.org/10.1515/dma.1998.8.2.127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fraim, John. "Friendly Persuasion." M/C Journal 3, no. 1 (2000). http://dx.doi.org/10.5204/mcj.1825.

Full text
Abstract:
"If people don't trust their information, it's not much better than a Marxist-Leninist society." -- Orville Schell Dean, Graduate School of Journalism, UC Berkeley "Most people aren't very discerning. Maybe they need good financial information, but I don't think people know what good information is when you get into culture, society, and politics." -- Steven Brill,Chairman and Editor-in-chief, Brill's Content Once upon a time, not very long ago, advertisements were easy to recognise. They had simple personalities with goals not much more complicated than selling you a bar of soap or a box of c
APA, Harvard, Vancouver, ISO, and other styles
49

Román, Roberto, Rosario Arjona, and Iluminada Baturone. "Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and their Use in Quantum-Resistant TLS Protocols." IEEE Access, 2025, 1. https://doi.org/10.1109/access.2025.3590863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rao, N. G., Upendra Kulkarni, Hari Prassanna C., Basawaraj Patil, and Rabbani G. "Design And Development Of Fast Disintegrating Tablet Of Felodipine By Vacuum Drying Technique." International Journal of Drug Delivery Technology 2, no. 2 (2010). http://dx.doi.org/10.25258/ijddt.v2i2.8847.

Full text
Abstract:
Felodipine which is used in the present study is a dihydropyridine derivative, that is chemically described as ethyl methyl-4-(2, 3-dichlorophenyl)-1,4-dihydro-2,6-dimethyl-3,5-pyridinedicarboxylate, widely accepted for its excellent antihypertensive and anti-anginal properties since it is calcium antagonist compound (calcium channel blocker). Felodipine is practically insoluble in water and its dissolution rate is limited by its physicochemical properties. In the present study fast disintegrating tablets of felodipine were prepared by adopting vacuum drying technique to study the effect of di
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!