-
1
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
-
Qiao, L., and Nahrstedt, K.: 'Watermarking schemes and protocols for protecting rightful ownerships and customer's rights', J. Vis. Commun. Image Represent., 1998, 9, (3), pp. 194-210
-
(1998)
J. Vis. Commun. Image Represent
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
2
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Memon, N., and Wong, P.W.: 'A buyer-seller watermarking protocol', IEEE Trans. Image Process., 2001, 10, (4), pp. 643-649
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
3
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H.: 'An efficient and anonymous buyer-seller watermarking protocol', IEEE Trans. Image Process, 2004, 13, (12), pp. 1618-1626
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
4
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC
-
Ju, H.S., Kim, H.J., Lee, D.H., and Lim, J.I.: 'An anonymous buyer-seller watermarking protocol with anonymity control', In Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC 2002, LNCS 2587, pp. 421-432
-
(2002)
LNCS
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
5
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
Zhou, J., Yung, M., and Han, Y. (Eds): Proc. Applied Cryptography and Network Security
-
Choi, J.-G., Sakurai, K., and Park, J.-H.: 'Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party', In Zhou, J., Yung, M., and Han, Y. (Eds): Proc. Applied Cryptography and Network Security 2003, LNCS 2846, pp. 265-279
-
(2003)
LNCS
, vol.2846
, pp. 265-279
-
-
Choi, J.-G.1
Sakurai, K.2
Park, J.-H.3
-
6
-
-
35048873815
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
-
Jakobsson, M., Yung, M., and Zhou, J. (Eds): Proc. Applied Cryptography and Network Security
-
Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., and Siddiqi, M.U.: 'Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity', In Jakobsson, M., Yung, M., and Zhou, J. (Eds): Proc. Applied Cryptography and Network Security 2004, LNCS 3089, pp. 369-382
-
(2004)
LNCS
, vol.3089
, pp. 369-382
-
-
Goi, B.-M.1
Phan, R.C.-W.2
Yang, Y.3
Bao, F.4
Deng, R.H.5
Siddiqi, M.U.6
-
7
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
Proc. Eurocrypt'99
-
Paillier, P.: 'Public key cryptosystems based on composite degree residuosity classes', In Proc. Eurocrypt'99 1999, Stern, J. (Ed.): LNCS 1592, pp. 223-238
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
8
-
-
0345058960
-
A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications
-
Laih, C.S. (Ed.): Proc. Aciacrypt
-
Bresson, E., Catalano, D., and Pointcheval, D.: 'A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications', In Laih, C.S. (Ed.): Proc. Aciacrypt, 2003, LNCS 2894, pp. 37-54
-
(2003)
LNCS
, vol.2894
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, T., and Shamoon, T.: 'Secure spread spectrum watermarking for multimedia', IEEE Trans. Image Process., 1997, 6, (12), pp. 1673-1687
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
|