Secure and oblivious information hiding in binary imageZheng HuangWeidong Kouet al.2013CSE 2013Conference paper
Dynamic adapter reconfiguration in the context of business protocol evolutionMaryam EslamichalandarKamel Barkaouiet al.2013CSE 2013Conference paper