Journal articles on the topic 'Subliminal channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Subliminal channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rosario, Hector. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208. http://dx.doi.org/10.2307/4146896.
Full textRosario, Héctor. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208–12. http://dx.doi.org/10.1080/07468342.2004.11922074.
Full textKoptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.
Full textHarn, L., and G. Gong. "Digital signature with a subliminal channel." IEE Proceedings - Computers and Digital Techniques 144, no. 6 (1997): 387. http://dx.doi.org/10.1049/ip-cdt:19971511.
Full textNarn-Yih Lee and Pei-Hsiu Ho. "Digital signature with a threshold subliminal channel." IEEE Transactions on Consumer Electronics 49, no. 4 (2003): 1240–42. http://dx.doi.org/10.1109/tce.2003.1261223.
Full textCetnarski, Ryszard, Alberto Betella, Hielke Prins, Sid Kouider, and Paul F. M. J. Verschure. "Subliminal Response Priming in Mixed Reality: The Ecological Validity of a Classic Paradigm of Perception." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 1–17. http://dx.doi.org/10.1162/pres_a_00171.
Full textLi, Su, Cui Guohua, Yang Muxiang, and Chen Jing. "Threshold subliminal channel based on designated verifier signature." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1485–88. http://dx.doi.org/10.1007/bf02831803.
Full textZhou, Xuan Wu, and Yan Fu. "Optimized E-Cash Scheme and its Formal Analysis." Advanced Materials Research 204-210 (February 2011): 1322–25. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1322.
Full textLee, Narn-Yih, and Shu-Ya Yang. "The design of integrating subliminal channel with access control." Applied Mathematics and Computation 171, no. 1 (2005): 573–80. http://dx.doi.org/10.1016/j.amc.2005.01.071.
Full textAnjan, K., N. K. Srinath, and Abraham Jibi. "ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SECURED COMMUNICATION." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 39–53. https://doi.org/10.5281/zenodo.8252269.
Full textDu, Bangyao, Debiao He, Min Luo, Cong Peng, and Qi Feng. "The Applications of Blockchain in the Covert Communication." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–18. http://dx.doi.org/10.1155/2022/4618007.
Full textAnjan, Krishnamurthy Koundinya, and Hebbur Satyanarayana Gururaja. "A typical analysis of hybrid covert channel using constructive entropy analytics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3820–26. https://doi.org/10.11591/ijece.v12i4.pp3820-3826.
Full textXiang, Lingyun, Yuhua Xie, Gang Luo, and Weizheng Wang. "On the Existence of Subliminal Channel in Instant Messaging Systems." International Journal of Security and Its Applications 9, no. 3 (2015): 353–62. http://dx.doi.org/10.14257/ijsia.2015.9.3.27.
Full textChen, Chien‐Yuan, Chin‐Chen Chang, and Wei‐Pang Yang. "A new subliminal channel based on fiat‐Shamir's signature scheme." Journal of the Chinese Institute of Engineers 18, no. 6 (1995): 867–72. http://dx.doi.org/10.1080/02533839.1995.9677754.
Full textChen, Tzung-Her, Wei-Bin Lee, Hsing-Bai Chen, and Chien-Lung Wang. "Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security." Symmetry 13, no. 5 (2021): 855. http://dx.doi.org/10.3390/sym13050855.
Full textChen, Chin-Ling, and Ming-He Liu. "A traceable E-cash transfer system against blackmail via subliminal channel." Electronic Commerce Research and Applications 8, no. 6 (2009): 327–33. http://dx.doi.org/10.1016/j.elerap.2009.04.012.
Full textChen, Chin-Ling, and Jyun-Jie Liao. "A fair online payment system for digital content via subliminal channel." Electronic Commerce Research and Applications 10, no. 3 (2011): 279–87. http://dx.doi.org/10.1016/j.elerap.2010.09.001.
Full textAnjan, K., N. K. Srinath, and Abraham Jibi. "Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine." International Journal of Network Security & Its Applications (IJNSA) 5, no. 6 (2013): 55–64. https://doi.org/10.5281/zenodo.5819555.
Full textZHANG, Qiu-yu, and Zhan-hui SUN. "Covert communication based on subliminal channel in elliptic curve digital signature algorithm." Journal of Computer Applications 30, no. 1 (2010): 196–97. http://dx.doi.org/10.3724/sp.j.1087.2010.00196.
Full textPomykała, Jacek. "ID-Based Digital Signatures with Security Enhanced Approach." Journal of Telecommunications and Information Technology, no. 4 (June 26, 2023): 146–53. http://dx.doi.org/10.26636/jtit.2009.4.1010.
Full textO’Keeffe, Ian R. "Soundtrack Localisation." Journal of Internationalization and Localization 2 (January 1, 2012): 36–65. http://dx.doi.org/10.1075/jial.2.03kee.
Full textRiener, Andreas, Pierre Chalfoun, and Claude Frasson. "The Potential of Subliminal Information Displays to Change Driver Behavior." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 51–70. http://dx.doi.org/10.1162/pres_a_00170.
Full textRitter, Walter. "Benefits of Subliminal Feedback Loops in Human-Computer Interaction." Advances in Human-Computer Interaction 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/346492.
Full textQingjun, Cai, and Zhang Yuli. "Subliminal channels in the NTRU and the subliminal-free methods." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1541–44. http://dx.doi.org/10.1007/bf02831816.
Full textSimmons, G. J. "The history of subliminal channels." IEEE Journal on Selected Areas in Communications 16, no. 4 (1998): 452–62. http://dx.doi.org/10.1109/49.668969.
Full textSimmons, Gustavus J. "Subliminal channels; past and present." European Transactions on Telecommunications 5, no. 4 (2010): 459–74. http://dx.doi.org/10.1002/ett.4460050408.
Full textGRUSHO, A. A. "On the existence of subliminal channels." Discrete Mathematics and Applications 9, no. 1 (1999): 1–6. http://dx.doi.org/10.1515/dma.1999.9.1.1.
Full textLee, Narn-Yih, and Pei-Hsiu Ho. "Convertible undeniable signature with subliminal channels." Applied Mathematics and Computation 158, no. 1 (2004): 169–75. http://dx.doi.org/10.1016/j.amc.2003.08.068.
Full textSimmons, G. J. "Results concerning the bandwidth of subliminal channels." IEEE Journal on Selected Areas in Communications 16, no. 4 (1998): 463–73. http://dx.doi.org/10.1109/49.668970.
Full textSafavi-Naini, R. S., and J. R. Seberry. "Error-correcting codes for authentication and subliminal channels." IEEE Transactions on Information Theory 37, no. 1 (1991): 13–17. http://dx.doi.org/10.1109/18.61124.
Full textYang, Chao-Lin, Chuan-Ming Li, and Tzonelih Hwang. "Subliminal channels in the identity-based threshold ring signature." International Journal of Computer Mathematics 86, no. 5 (2009): 753–70. http://dx.doi.org/10.1080/00207160701663315.
Full textTihanyi, Norbert. "Fault-injection based backdoors in Pseudo Random Number Generators." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 233–45. http://dx.doi.org/10.1556/012.2015.52.2.1317.
Full textLin, Dai-Rui, Chih-I. Wang, Zhi-Kai Zhang, and D. J. Guan. "A digital signature with multiple subliminal channels and its applications." Computers & Mathematics with Applications 60, no. 2 (2010): 276–84. http://dx.doi.org/10.1016/j.camwa.2010.01.001.
Full textKutyłowski, Mirosław, and Oliwer Sobolewski. "Privacy Illusion: Subliminal Channels in Schnorr-like Blind-Signature Schemes." Applied Sciences 15, no. 5 (2025): 2864. https://doi.org/10.3390/app15052864.
Full textPraamstra, Peter, and Ellen Seiss. "The Neurophysiology of Response Competition: Motor Cortex Activation and Inhibition following Subliminal Response Priming." Journal of Cognitive Neuroscience 17, no. 3 (2005): 483–93. http://dx.doi.org/10.1162/0898929053279513.
Full textChing-Nung, Yang, and Laih Chi-Sung. "A note on error-correcting codes for authentication and subliminal channels." Information Processing Letters 62, no. 3 (1997): 141–43. http://dx.doi.org/10.1016/s0020-0190(97)00053-7.
Full textIonică, Laura. "War Terminology and its Psychological Impact." Scientific Bulletin of the Politehnica University of Timişoara Transactions on Modern Languages 21 (April 27, 2023): 45–53. http://dx.doi.org/10.59168/pcmc1171.
Full textKobara, Kazukuni, and Hideki Imai. "The capacity of narrow-band subliminal channels in the case of successive carrier transmission." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 84, no. 1 (2000): 1–10. http://dx.doi.org/10.1002/1520-6440(200101)84:1<1::aid-ecjc1>3.0.co;2-l.
Full textKobara, Kazukuni, and Hideki Imai. "An error-control method for narrow-band subliminal channels: How to embed more bits in a carrier." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 84, no. 8 (2001): 1–10. http://dx.doi.org/10.1002/ecjc.1023.
Full textChoi, Youngrak, Yongjin Yeom, and Ju-Sung Kang. "Subliminal Channels of CRYSTALS-Kyber Applicable in the Black Box Cryptographic Module and Potential Security Threats of IP Cameras." Journal of Korean Institute of Communications and Information Sciences 48, no. 6 (2023): 630–47. http://dx.doi.org/10.7840/kics.2023.48.6.630.
Full textDrabu, Onaiza. "Who Is the Muslim? Discursive Representations of the Muslims and Islam in Indian Prime-Time News." Religions 9, no. 9 (2018): 283. http://dx.doi.org/10.3390/rel9090283.
Full textGrusho, A. A., and E. L. Shumitskaya. "Non-interference models and subliminal channels." Discrete Mathematics and Applications 12, no. 1 (2002). http://dx.doi.org/10.1515/dma-2002-0103.
Full textAnjan, K., Abraham Jibi, and Jadhav V. Mamatha. "Design of Transport Layer Based Hybrid Covert Channel Detection Engine." November 20, 2020. https://doi.org/10.5281/zenodo.4281769.
Full textChen, Chin-Ling, Kun-hao Wang, Chun-Long Fan, and Chien-Hung Chen. "An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel." Information Technology And Control 46, no. 4 (2017). http://dx.doi.org/10.5755/j01.itc.46.4.14163.
Full textShi, Yuxi, Gowrishankar Ganesh, Hideyuki Ando, Yasuharu Koike, Eiichi Yoshida, and Natsue Yoshimura. "Galvanic Vestibular Stimulation-Based Prediction Error Decoding and Channel Optimization." International Journal of Neural Systems, August 11, 2021, 2150034. http://dx.doi.org/10.1142/s0129065721500349.
Full textArmour, Marcel, and Bertram Poettering. "Algorithm substitution attacks against receivers." International Journal of Information Security, June 21, 2022. http://dx.doi.org/10.1007/s10207-022-00596-5.
Full textGRUSHO, A. A. "Subliminal channels and information security in Computer Systems." Discrete Mathematics and Applications 8, no. 2 (1998). http://dx.doi.org/10.1515/dma.1998.8.2.127.
Full textFraim, John. "Friendly Persuasion." M/C Journal 3, no. 1 (2000). http://dx.doi.org/10.5204/mcj.1825.
Full textRomán, Roberto, Rosario Arjona, and Iluminada Baturone. "Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and their Use in Quantum-Resistant TLS Protocols." IEEE Access, 2025, 1. https://doi.org/10.1109/access.2025.3590863.
Full textRao, N. G., Upendra Kulkarni, Hari Prassanna C., Basawaraj Patil, and Rabbani G. "Design And Development Of Fast Disintegrating Tablet Of Felodipine By Vacuum Drying Technique." International Journal of Drug Delivery Technology 2, no. 2 (2010). http://dx.doi.org/10.25258/ijddt.v2i2.8847.
Full text