{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:03:54Z","timestamp":1772042634960,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540671824","type":"print"},{"value":"9783540465140","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719724_32","type":"book-chapter","created":{"date-parts":[[2006,12,28]],"date-time":"2006-12-28T21:07:17Z","timestamp":1167340037000},"page":"463-477","source":"Crossref","is-referenced-by-count":46,"title":["StegFS: A Steganographic File System for Linux"],"prefix":"10.1007","author":[{"given":"Andrew D.","family":"McDonald","sequence":"first","affiliation":[]},{"given":"Markus G.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M.: A Cryptographic File System for Unix. In: Proceedings of 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1993, pp. 9\u201316 (1993), ftp:\/\/ftp.research.att.com\/dist\/mab\/cfs.ps","DOI":"10.1145\/168588.168590"},{"key":"32_CR2","unstructured":"Persiano, G., et al.: TCFS - Transparent Cryptographic File System. In: DIA, Universita\u2019 Degli Studi Di Salerno, Italy, http:\/\/tcfs.dia.unisa.it\/"},{"key":"32_CR3","unstructured":"Encrypting File System for Windows 2000, Microsoft Windows 2000 White Paper, Microsoft Corp (1998), http:\/\/www.microsoft.com\/windows\/server\/Technical\/security\/encrypt.asp"},{"key":"32_CR4","unstructured":"Linux Kernel International Patches, http:\/\/www.kerneli.org"},{"key":"32_CR5","unstructured":"Gutmann, P.: Secure FileSystem (SFS) for DOS\/Windows. Internet Web page, http:\/\/www.cs.auckland.ac.nz\/~pgut001\/sfs\/"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-49380-8_6","volume-title":"Information Hiding","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Needham, R., Shamir, A.: The Steganographic File System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 73\u201382. Springer, Heidelberg (1998), http:\/\/www.cl.cam.ac.uk\/ftp\/users\/rja14\/sfs3.ps.gz"},{"key":"32_CR7","unstructured":"Roe, M.: Cryptography and Evidence. PhD thesis, University of Cambridge, Computer Laboratory (1997), http:\/\/www.ccsr.cam.ac.uk\/techreports\/tr1\/"},{"key":"32_CR8","unstructured":"C.: A Steganographic File System Implementation for Linux. University of Cape Town, South Africa (October 1998), Software available on http:\/\/wwwusers.rwthaachen.de\/Peter.SchneiderKamp\/sources\/sfs\/"},{"key":"32_CR9","unstructured":"Torvalds, L., et al.: Linux2.2 -Kernel. C sourcecode (1991), http:\/\/www.kernel.org\/"},{"key":"32_CR10","volume-title":"The Design of the UNIX Operating System","author":"M. Bach","year":"1986","unstructured":"Bach, M.: The Design of the UNIX Operating System. Prentice-Hall, Englewood Cliffs (1986)"},{"key":"32_CR11","unstructured":"Card, R., Ts\u2019o, T., Tweedie, S.: Design and Implementation of the Second Extended Filesystem. In: Brokken, F.B., et al. (eds.) Proceedings of the First Dutch International Symposium on Linux. State University of Groningen (1995), http:\/\/www.mit.edu\/~tytso\/linux\/ext2intro.html ISBN 90-367-0385-9"},{"key":"32_CR12","unstructured":"Gutmann, P.: Software Generation of Practically Strong Random Numbers. In: Seventh USENIX Security Symposium Proceedings, San Antonio, Texas, January 1998, pp. 243\u2013257 (1998), http:\/\/www.cs.auckland.ac.nZ\/~pgut001\/pubs\/random.pdf"},{"key":"32_CR13","unstructured":"AMAN scramdisk@hotmail.com. ScramDisk - disk encryption software, http:\/\/www.scramdisk.clara.net\/"},{"key":"32_CR14","unstructured":"Gladman, B.: AES algorithm efficiency., http:\/\/www.seven77.demon.co.uk\/cryptography_technology\/Aes\/"},{"key":"32_CR15","unstructured":"Roger, M., Needham, D.J.: Wheeler: Tea extensions. Draft technical report, Computer Laboratory, University of Cambridge (October 1997), http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/users\/djw3\/xtea.ps"},{"key":"32_CR16","unstructured":"Wheeler, D.J., Needham, R.M.: Correction to xtea. Draft technical report, Computer Laboratory, University of Cambridge (October 1998), http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/users\/djw3\/xxtea.ps"},{"key":"32_CR17","unstructured":"Bray, T.: Bonnie file system benchmark, USENET newsgroup comp.arch (1990), http:\/\/www.textuality.com\/bonnie\/"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719724_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:19:32Z","timestamp":1556003972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719724_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540671824","9783540465140"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/10719724_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}