-
1
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Crypto99
-
D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," Crypto99, Lecture Notes in Computer Science (LNCS) 1666, pp 338-353, 1999.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
CRYPTO'95
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," CRYPTO'95, LNCS 963, pp.452-465, 1995.
-
(1995)
LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
84985922619
-
Tracing traitors
-
Crypto94
-
B. Chor,A. Fiat and M. Naor, "Tracing traitors," Crypto94, LNCS 839, pp. 257-270, 1994.
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
4
-
-
84957617696
-
Threshold traitor tracing
-
Crypto98
-
M. Naor and B. Pinkas, "Threshold traitor tracing," Crypto98, LNCS 1462,pp. 502-517, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
6
-
-
35248899841
-
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
-
Y. Dodis and N. Fazio, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack," Publick key conference 2003, pp.100-115, 2003.
-
(2003)
Publick Key Conference 2003
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
7
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAM J. on Discrete Math, 11(1):41- 53,1998.
-
(1998)
SIAM J. on Discrete Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
9
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Advances in Cryptology - EURO-CRYPT'99
-
Funda Ergun, Joe Kilian and Ravi Kumar, "A note on the limits of collusion-resistant watermarks," Advances in Cryptology - EURO-CRYPT'99, LNCS 1592, pp. 140-149, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
11
-
-
0141856343
-
Resistance of orthogonal Gaussian fingerprints to collusion attacks
-
Z. Jane Wang, Min Wu, Hong Zhao, K. J. Ray Liu and Wade Trappe, "Resistance of orthogonal Gaussian fingerprints to collusion attacks," ICASSP (2003) IV724-727.
-
(2003)
ICASSP
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Liu, K.J.R.4
Trappe, W.5
-
14
-
-
0141855111
-
Nonlinear collusion attacks on independent fingerprints for multimedia
-
Hong Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu, "Nonlinear Collusion Attacks on Independent Fingerprints For Multimedia," ICASSP (2003), V664-667 1.
-
ICASSP (2003)
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
17
-
-
0038527384
-
Anti-collusion fingerprinting for Multimedia
-
W. Trappe, M. Wu, Z. Jane Wang and K. J. Ray Liu, "Anti-collusion fingerprinting for Multimedia," IEEE Trans. on Signal Processing, 51(4):1 069-1087, 2003.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
18
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans, on Image Processing, 6(12):1673-1687, 1997.
-
(1997)
IEEE Trans, on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
19
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
Karen Su, Deepa Kundur, and Dimitrios Hatzinakos, "Statistical Invisibility for Collusion-resistant Digital Video Watermarking," IEEE Transactions on Multimedia, http://www.srcf.ucam.org/~ks349/research.php3
-
IEEE Transactions on Multimedia
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
|