{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:23Z","timestamp":1740098903882,"version":"3.37.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_26","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"414-421","source":"Crossref","is-referenced-by-count":0,"title":["Stegogames"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4147-7898","authenticated-orcid":false,"given":"Clark","family":"Thomborson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0176-7129","authenticated-orcid":false,"given":"Marc","family":"Jeanmougin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"26_CR1","series-title":"Mathematical Biosciences Institute Lecture Series","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-21554-9_1","volume-title":"Stochastic Population and Epidemic Models","author":"LJS Allen","year":"2015","unstructured":"Allen, L.J.S.: Continuous-time and discrete-state branching processes. Stochastic Population and Epidemic Models. MBILS, vol. 1.3, pp. 1\u201312. Springer, Cham (2015). doi:\n10.1007\/978-3-319-21554-9_1"},{"issue":"2","key":"26_CR2","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0890-5401(91)90069-E","volume":"91","author":"SJ Bellantoni","year":"1991","unstructured":"Bellantoni, S.J.: Parallel random access machines with bounded memory wordsize. Inf. Comput. 91(2), 259\u2013273 (1991)","journal-title":"Inf. Comput."},{"issue":"3","key":"26_CR3","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0019-9958(82)90766-5","volume":"52","author":"A Borodin","year":"1982","unstructured":"Borodin, A., von zur Gathen, J., Hopcroft, J.: Fast parallel matrix and GCD computations. Inf. Control 52(3), 241\u2013256 (1982)","journal-title":"Inf. Control"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-62034-6_57","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"H Fernau","year":"1996","unstructured":"Fernau, H., Lange, K.-J., Reinhardt, K.: Advocating ownership. In: Chandru, V., Vinay, V. (eds.) FSTTCS 1996. LNCS, vol. 1180, pp. 286\u2013297. Springer, Heidelberg (1996). doi:\n10.1007\/3-540-62034-6_57"},{"issue":"5","key":"26_CR5","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TC.2008.199","volume":"58","author":"N Hopper","year":"2009","unstructured":"Hopper, N., von Ahn, L., Langford, J.: Provably secure steganography. IEEE Trans. Comput. 58(5), 662\u2013676 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"26_CR6","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.tcs.2012.03.037","volume":"505","author":"M Li\u015bkiewicz","year":"2013","unstructured":"Li\u015bkiewicz, M., Reischuk, R., W\u00f6lfel, U.: Grey-box steganography. Theoret. Comput. Sci. 505, 27\u201341 (2013)","journal-title":"Theoret. Comput. Sci."},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-642-38236-9_27","volume-title":"Theory and Applications of Models of Computation","author":"H Takebe","year":"2013","unstructured":"Takebe, H., Tanaka, K.: Grey-box public-key steganography. In: Chan, T.-H.H., Lau, L.C., Trevisan, L. (eds.) TAMC 2013. LNCS, vol. 7876, pp. 294\u2013305. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-38236-9_27"},{"issue":"3","key":"26_CR8","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/0161-119291866883","volume":"XVI","author":"P Wayner","year":"1992","unstructured":"Wayner, P.: Mimic functions. Cryptologia XVI(3), 193\u2013214 (1992)","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:22:42Z","timestamp":1496096562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}