Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
70
views
0
references
Top references
cited by
71
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,106
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology
The Prisoners’ Problem and the Subliminal Channel
other
Author(s):
Gustavus J. Simmons
Publication date
(Print):
1984
Publisher:
Springer US
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electron Channelling Contrast Imaging (ECCI)
Author and book information
Book Chapter
Publication date (Print):
1984
Pages
: 51-67
DOI:
10.1007/978-1-4684-4730-9_5
SO-VID:
62e7921d-5033-44a0-aa9d-0c431e4217ef
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Knapsack Public Key Cryptosystems and Diophantine Approximation
pp. 25
Solving Low Density Knapsacks
pp. 51
The Prisoners’ Problem and the Subliminal Channel
pp. 153
Blind Signature System
pp. 171
Analytical Characteristics of the DES
pp. 203
Producing a One-Way Hash Function from DES
pp. 293
Permutation Polynomials in RSA-Cryptosystems
pp. 383
Electronic Wallet
Similar content
4,106
Traces of terror: subliminal death primes and facial electromyographic indices of affect
Authors:
J. Arndt
,
Michael ALLEN
,
J Greenberg
…
Subliminal words durably affect neuronal activity.
Authors:
Michel Baulac
,
Jean Willer
,
Lionel Naccache
…
Prevention and mitigation of injuries and damages arising from the activity of subliminal enterprises: A case study in Slovakia
Authors:
Katarína Mäkká
,
Katarína Kampová
,
Tomas Lovecek
…
See all similar
Cited by
71
Digital image steganography: Survey and analysis of current methods
Authors:
Kevin Curran
,
Abbas Cheddad
,
Joan Condell
…
On the limits of steganography
Authors:
R.J. Anderson
,
F.A.P. Petitcolas
Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images
Authors:
Amit Kumar Singh
See all cited by