Login / Signup

Provably Secure Steganography and the Complexity of Sampling.

Christian HundtMaciej LiskiewiczUlrich Wölfel
Published in: ISAAC (2006)
Keyphrases
  • provably secure
  • key management
  • information systems
  • query processing
  • public key
  • standard model
  • security model