期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information 被引量:5
1
作者 ZHANGWei-ming LIShi-qu +1 位作者 CAOJia LIUJiu-fen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期315-318,共4页
The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extra... The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance ofstego-key, and the theoretic conclusion is used to analyze the actual extracting attack on LeastSignificant Bit(LSB) steganographic algorithms. 展开更多
关键词 information hiding STEGANOGRAPHY extracting attack difficulty ofextraction unicity distance
下载PDF
A New Communication Scheme for Threshold Certificate Authority in Ad Hoc Networks
2
作者 LiGuang-song LIHong RANWen-bao 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期123-126,共4页
We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactiv... We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast. 展开更多
关键词 Ad hoc networks key management threshold cryptography CA (certificateauthority) MULTICAST
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部