共 40 条
[31]
LUBY M, 1986, LECT NOTES COMPUT SC, V218, P447
[32]
Lysyanskaya A, 2006, LECT NOTES COMPUT SC, V3958, P123
[33]
Naor M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P33, DOI 10.1145/73007.73011
[34]
Decoy Password Vaults: At Least as Hard as Steganography?
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017,
2017, 502
:356-370
[35]
Constructing perfect steganographic systems
[J].
INFORMATION AND COMPUTATION,
2011, 209 (09)
:1223-1230
[36]
Simon DR, 1998, LECT NOTES COMPUT SC, V1403, P334, DOI 10.1007/BFb0054137
[37]
Van Le T, 2007, LECT NOTES COMPUT SC, V4437, P297
[38]
von Ahn L, 2004, LECT NOTES COMPUT SC, V3027, P323
[39]
von Ahn L., 2003, IACR CRYPTOLOGY EPRI, V2003/233