Back to Results
First PageMeta Content



IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. X, XXX 2009
Add to Reading List

Document Date: 2009-03-17 15:32:54


Open Document

File Size: 967,13 KB

Share Result on Facebook

City

New York / HOPPER ET / /

Company

Oracle / Russell / Simmons / Yahoo! / /

Currency

SEK / USD / /

/

Event

Force Majeure / /

Facility

Carnegie Mellon University / University of Minnesota / /

IndustryTerm

steganographic protocol / secure protocols / secure steganographic protocol / innocent communications / real-world communications / typical real-world communications / probabilistic algorithms / /

NaturalFeature

Þinformative channel / /

Organization

University of Minnesota / Minneapolis / Department of Computer Science and Engineering / Computer Science Department / US Department of Defense / Carnegie Mellon University / Pittsburgh / IEEE Computer Society / /

Person

Ch / Van Le / Bob / Alice / Luis von Ahn / Chi Proof / /

Position

Prime Minister / auditor / passive warden / restrictive model of innocent communication / E½^ pm / designer / warden / /

ProgrammingLanguage

C / K / D / /

ProvinceOrState

Minnesota / New York / Connecticut / South Dakota / Pennsylvania / North Carolina / /

PublishedMedium

IEEE TRANSACTIONS ON COMPUTERS / /

Technology

encoding algorithm / Machine Learning / secret key / TCP/IP protocol / encryption / cryptography / provably secure steganographic protocol / steganographic protocol / M. Both algorithms / Digital Object Identifier / /

SocialTag