References
- D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280, May (2008). DOI: https://doi.org/10.17487/RFC5280
- S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, http://bitcoin.org/bitcoin.pdf, (2009).
- T. Moore and C. Nicolas, Beware the middleman: Empirical analysis of Bitcoin-exchange risk, International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, (2013). DOI: https://doi.org/10.1007/978-3-642-39884-1_3
- B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0, RFC 2898, September (2000). DOI: https://doi.org/10.17487/RFC2898
- B. Kaliski, PKCS #8: Private-Key Information Syntax Specification Version 1.2, RFC 5208, May (2008). DOI: https://doi.org/10.17487/RFC5208
- Mike Caldwell and Aaron Voisine, Passphrase-protected private key, https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki.
- Andreas M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, O'Reilly Media, Inc., (2014).
- Adi Shamir, How to share a secret, Communications of the ACM, Volume 22, Issue 11, Pages 612-613, Nov. (1979). DOI: https://doi.org/10.1145/359168.359176
- Hie-Do Kim, A Study on the Secure Double Pipe Hash Function, The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 10, No. 6, pp. 201-208, Dec 2010. DOI: https://doi.org/10.7236/JIIBC.2010.12.201.
- Hyung-Kyu Yang, A Fast and Secure Method to Preserve Anonymity in Electronic Voting, The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 14, No. 1, pp. 245-251, Feb 2014. DOI: https://doi.org/10.7236/JIIBC.2014.02.245.
- Jessica Fridrich, Miroslav Goljan, and Rui Du, Detecting LSB steganography in color, and gray-scale images, IEEE multimedia, Volume 8, Issue 4, Pages 22-28, (2001). DOI: https://doi.org/10.1109/93.959097
- Jessica Fridrich, Tomas Pevny, and Jan Kodovsky, Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, In Proceedings of the 9th workshop on Multimedia & security (MM&Sec '07), ACM, New York, NY, USA, 3-14, (2007). DOI: https://doi.org/10.1145/1288869.1288872
- D. Upham, Jsteg, http://www.securityfocus.com/tools/1434, (1997).
- Ralph Norman Haber, How we remember what we see, Scientific American, Volume 222, Issue 5, Pages 103-112, May (1970).
- L. Standing, J. Conezio, and R.N. Haber, Perception and memory for pictures: Single-trial learning of 2500 visual stimuli, Psychonomic Science, Volume 19, Issue 2, Pages 73-74, (1970). https://doi.org/10.3758/BF03337426
- R. Dhamija, A. Perrig, Deja Vu: User study using images for authentication, In Ninth Usenix Security Symposium, (2000).