Open Access
[기술해설]암호법(Cryptography)
조위덕
- Vol. 3, Iss: 2, pp 14-20
About:
The article was published on 1987-07-01 and is currently open access. It has received 277 citations till now.read more
Citations
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Optimally sparse representation in general (nonorthogonal) dictionaries via 1 minimization
David L. Donoho,Michael Elad +1 more
TL;DR: This article obtains parallel results in a more general setting, where the dictionary D can arise from two or several bases, frames, or even less structured systems, and sketches three applications: separating linear features from planar ones in 3D data, noncooperative multiuser encoding, and identification of over-complete independent component models.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Book ChapterDOI
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.
Journal ArticleDOI
Robust audio watermarking using perceptual masking
TL;DR: This work presents a watermarking procedure to embed copyright protection into digital audio by directly modifying the audio samples and introduces the notion of a dual watermark: one which uses the original signal during detection and one which does not.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Optimally sparse representation in general (nonorthogonal) dictionaries via 1 minimization
David L. Donoho,Michael Elad +1 more
TL;DR: This article obtains parallel results in a more general setting, where the dictionary D can arise from two or several bases, frames, or even less structured systems, and sketches three applications: separating linear features from planar ones in 3D data, noncooperative multiuser encoding, and identification of over-complete independent component models.
Book ChapterDOI
How to generate cryptographically strong sequences of pseudo random bits
Manuel Blum,Silvio Micali +1 more
TL;DR: A general algorithmic scheme for constructing polynomial-time deterministic algorithms that stretch a short secret random input into a long sequence of unpredictable pseudo-random bits is presented.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Book ChapterDOI
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.