-
1
-
-
0026834814
-
"Construction of asymptotically good low-rate error-correcting codes through pseudorandom graphs,"
-
vol. 38, pp. 509-516, 1992.
-
N. Alon, J. Brück, J. Naor, M. Naor, and R. Roth, "Construction of asymptotically good low-rate error-correcting codes through pseudorandom graphs," IEEE Trans. Inform. Theory, vol. 38, pp. 509-516, 1992.
-
IEEE Trans. Inform. Theory
-
-
Alon, N.1
Brück, J.2
Naor, J.3
Naor, M.4
Roth, R.5
-
3
-
-
0002221784
-
"Protocols for collusion-secure assymetric fingerprinting," in
-
I. Biehl and B. Meyer, "Protocols for collusion-secure assymetric fingerprinting," in Proc. STAGS, 1997.
-
Proc. STAGS, 1997.
-
-
Biehl, I.1
Meyer, B.2
-
4
-
-
0002994426
-
"Fingerprinting long forgiving messages," in
-
1985, pp. 180-189.
-
G. Blakley, C. Meadows, and G. Purdy, "Fingerprinting long forgiving messages," in Proc. Crypto, 1985, pp. 180-189.
-
Proc. Crypto
-
-
Blakley, G.1
Meadows, C.2
Purdy, G.3
-
5
-
-
84957670625
-
"Collusion secure fingerprinting for digital data," in
-
95, LNCS 963, pp. 452-465.
-
D. Boneh and J. Shaw, "Collusion secure fingerprinting for digital data," in Proc. Crypto'95, LNCS 963, pp. 452-465.
-
Proc. Crypto'
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0028592391
-
"Electronic marking and identification techniques to discourage document copying," in
-
June 1994, pp. 1278-1287.
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," in Proc.Infocom'94, June 1994, pp. 1278-1287.
-
Proc.Infocom'94
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
7
-
-
0002152920
-
"Assuring ownership rights for digital images," in
-
95H, H. Brueggemann and W. Gerhardt-Haeckl, Eds. Germany: Vieweg, 1995.
-
G. Caronni, "Assuring ownership rights for digital images," in Proc. "Reliable IT Systems" (Verlaessliche IT-Systeme) VIS'95H, H. Brueggemann and W. Gerhardt-Haeckl, Eds. Germany: Vieweg, 1995.
-
Proc. "Reliable IT Systems" (Verlaessliche IT-Systeme) VIS'
-
-
Caronni, G.1
-
8
-
-
33747248218
-
-
Y. M. Chee, "Turân-type problems in group testing, coding theory and cryptography," Ph.D. dissertation, University of Waterloo, Waterloo, Ont., Canada, 1996.
-
"Turân-type problems in group testing, coding theory and cryptography," Ph.D. dissertation, University of Waterloo, Waterloo, Ont., Canada, 1996
-
-
Chee, Y.M.1
-
9
-
-
84985922619
-
"Tracing traitors," in
-
94, pp. 257-270.
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," in Proc. Crypto'94, pp. 257-270.
-
Proc. Crypto'
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
10
-
-
84947937393
-
"A secure robust watermark for multimedia," in
-
1174. New York: Springer-Verlag, 1996, pp. 185-206.
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure robust watermark for multimedia," in Information Hiding, LNCS 1174. New York: Springer-Verlag, 1996, pp. 185-206.
-
Information Hiding, LNCS
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
11
-
-
33747227917
-
-
DigiMarc Co. [Online]. Available WWW: http://www.digimarc.com.
-
-
-
-
12
-
-
51249175955
-
"Families of finite sets in which no set is covered by the union of r others,"
-
vol. 51, pp. 79-89, 1985.
-
P. Erdös, P. Frankl, and Z. Füredi, "Families of finite sets in which no set is covered by the union of r others," Israel J. Math., vol. 51, pp. 79-89, 1985.
-
Israel J. Math.
-
-
Erdös, P.1
Frankl, P.2
Füredi, Z.3
-
15
-
-
33747266858
-
-
M. Naor, private communications.
-
-
-
Naor, M.1
-
18
-
-
33747211039
-
"Anonymous fingerprinting," in
-
97, pp. 88-102.
-
_, "Anonymous fingerprinting," in Proc. Eurocrypt'97, pp. 88-102.
-
Proc. Eurocrypt'
-
-
-
20
-
-
33747325706
-
"Combinatorial properties and constructions of traceability schemes and frameproof codes,"
-
D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAM J. Discr. Math., to be published.
-
SIAM J. Discr. Math., to Be Published.
-
-
Stinson, D.R.1
Wei, R.2
-
21
-
-
0025547039
-
"Embedding secret information into a dithered multi-level image," in
-
K. Tanaka, Y. Nakamura, and K. Matsui, "Embedding secret information into a dithered multi-level image," in Proc. 1990 IEEE Military Communications Conf., Sept. 1990, pp. 216-220.
-
Proc. 1990 IEEE Military Communications Conf., Sept. 1990, Pp. 216-220.
-
-
Tanaka, K.1
Nakamura, Y.2
Matsui, K.3
|