Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trends in steganography
E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …
Verifying completeness of relational query results in data publishing
HH Pang, A Jain, K Ramamritham, KL Tan - Proceedings of the 2005 …, 2005 - dl.acm.org
In data publishing, the owner delegates the role of satisfying user queries to a third-party
publisher. As the publisher may be untrusted or susceptible to attacks, it could produce …
publisher. As the publisher may be untrusted or susceptible to attacks, it could produce …
Information hiding: challenges for forensic experts
W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …
Toward robust hidden volumes using write-only oblivious RAM
With sensitive data being increasingly stored on mobile devices and laptops, hard disk
encryption is more important than ever. In particular, being able to plausibly deny that a hard …
encryption is more important than ever. In particular, being able to plausibly deny that a hard …
Deftl: Implementing plausibly deniable encryption in flash translation layer
Mobile devices today have been increasingly used to store and process sensitive
information. To protect sensitive data, mobile operating systems usually incorporate a …
information. To protect sensitive data, mobile operating systems usually incorporate a …
On implementing deniable storage encryption for mobile devices
A Skillen, M Mannan - 2013 - spectrum.library.concordia.ca
Data confidentiality can be effectively preserved through encryption. In certain situations, this
is inadequate, as users may be coerced into disclosing their decryption keys. In this case …
is inadequate, as users may be coerced into disclosing their decryption keys. In this case …
An application-layer plausibly deniable encryption system for wearable devices
Wearable devices especially smartwatches are widely used in our daily life. With their
increased use, a large amount of sensitive data are collected, stored, and managed in those …
increased use, a large amount of sensitive data are collected, stored, and managed in those …
A short survey on image steganography and steganalysis techniques
The paper describes a short survey on different types of steganography techniques for
image in spatial and transform domains and steganalysis techniques for the detection of …
image in spatial and transform domains and steganalysis techniques for the detection of …
[HTML][HTML] Time is on my side: Steganography in filesystem metadata
We propose and explore the applicability of file timestamps as a steganographic channel.
We identify an information gap between storage and usage of timestamps in modern …
We identify an information gap between storage and usage of timestamps in modern …
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …
access to a Linux system, even one that implements secure deallocation, can recover the …