From c6e64c6c7b119970d1cbf8c7373e18256b860dc6 Mon Sep 17 00:00:00 2001 From: guyeux Date: Tue, 25 Oct 2011 15:47:47 +0200 Subject: [PATCH] Fin de la visitation de ih, iihmsp, iwdw, africacrypt et asiacrypt pour l'anonymat --- keywords.txt | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/keywords.txt b/keywords.txt index b4dacf2..18c326a 100644 --- a/keywords.txt +++ b/keywords.txt @@ -7,7 +7,8 @@ Multimedia forensics and counter forensics Combination of data hiding and cryptography for Internet anonymity Steganography and steganalysis applied to the Internet Anonymity and privacy through the Internet -Information theoretic, stochastic aspects of anonymity through the Internet +Information theory of anonymity +Stochastic aspects of anonymity through the Internet Covert/subliminal channels through the Internet Cryptography and cryptanalysis for Internet anonymity Mathematical modeling of Internet anonymity @@ -15,7 +16,8 @@ Attacks and counter-attacks of anonymity Security issues in raised by anonymity through the Internet Channel coding techniques for anonymity Security proofs in the context of Internet Anonymity - +Secret-key and public-key cryptography for guaranteeing anonymity +Efficient implementations of anonymity through the Internet ==================== Jean-François ========================= -- 2.39.5