T.M. Cover, J. A. Thomas, Elements of Information Theory, New York, Wiley, 1991, 18-19.[2]U.M. Maurer, A unified and generalized treatment of authentication theory, Proc. 13th Annual Symposium on Theoretical Aspects of Computer Science (C. Puech, et al. eds.), vol. 1046 ofLNCS, Berlin: Springer, 1996, 190-198.[3]G.J. Simmons.[J].Subliminal communication is easy using the DSA. Advances in Cryptology EUROCRYPT93 Proc., Berlin, Springer-Verlag.1994,:-[4]G.J. Simmons, Subliminal channels: past and present, European Transactions on Telecomunications, 1994, 4(4), 459-473.[5]R. Anderson, et al, The Newton channel, Lecture Notes in Computer Science 1174, Proc. of Information Hiding, First International Workshop, Cambridge, UK, May 30-June 1, 1996, Berlin,Springer-Verlag, 1996, 151-156.[6]G.J. Simmons, Results concerning the bandwidth of subliminal channels, IEEE J. on Selected Areas in Communications, 1998, 16(4), 463-473.[7]孟庆生,信息论,西安,西安交通大学出版社,1987年11月,6-7.
|