메뉴 건너뛰기




Volumn , Issue , 2003, Pages 133-141

Constructing a virtual primary key for fingerprinting relational data

Author keywords

Fingerprinting; Primary keys; Relational databases; Robustness

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); CRYPTOGRAPHY; DATABASE SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 18844407290     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/947397.947398     Document Type: Conference Paper
Times cited : (59)

References (9)
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion secure fingerprinting for digital data
    • D. Boneh and J. Shaw. Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 3
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
    • May
    • S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal on Selected Areas of Communications, 16(4):573-586, May 1998.
    • (1998) IEEE Journal on Selected Areas of Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 6
    • 24944516446 scopus 로고    scopus 로고
    • Fingerprinting relational databases
    • Center for Secure Information Systems, George Mason University, Fairfax, VA, May
    • Y. Li, V. Swamp, and S. Jajodia. Fingerprinting relational databases. Technical report, Center for Secure Information Systems, George Mason University, Fairfax, VA, May 2003.
    • (2003) Technical Report
    • Li, Y.1    Swamp, V.2    Jajodia, S.3
  • 9
    • 18844403562 scopus 로고    scopus 로고
    • Hiding functions and computational security of image watermarking systems
    • N. Tran. Hiding functions and computational security of image watermarking systems. In 15th IEEE Computer Security Foundations Workshop, pages 295-306, 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 295-306
    • Tran, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.