-
1
-
-
0041513205
-
Watermarking relational data: framework, algorithms and analysis
-
Agrawal R., and Kiernan J. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12 2 (2003) 157-169
-
(2003)
The VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Kiernan, J.2
-
2
-
-
33749658402
-
-
D. Carney, U. Cetintemel, M. Cherniack, S. Lee, G. Seidman, N. Stonebraker, M. Tatbul, S. Zdonik, Monitoring streams-a new class of data management application, in: Proceedings of the International Conference on Very Large Data Bases (VLDB), 2002, pp. 215-226.
-
-
-
-
3
-
-
16244422981
-
A fragile watermark error detection scheme for wireless video Communications
-
Chen M., He Y., and Lagendijk R. A fragile watermark error detection scheme for wireless video Communications. IEEE Transactions on Multimedia 7 2 (2003) 315-329
-
(2003)
IEEE Transactions on Multimedia
, vol.7
, Issue.2
, pp. 315-329
-
-
Chen, M.1
He, Y.2
Lagendijk, R.3
-
4
-
-
0033309988
-
-
J. Fridrich, M. Du. Images with self-correcting capabilities, in: Proceedings of the IEEE International Conference on Image Processing, 1999, pp. 792-796.
-
-
-
-
5
-
-
0034765589
-
-
J. Fridrich, M. Goljan, M. Du, Invertible authentication, in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 2001, pp. 197-208.
-
-
-
-
6
-
-
84889351757
-
-
R. Gennaro, P. Rohatgi, How to sign digital streams, in: Proceedings of the 17th Annual International Cryptology Conference (Crypto'97), 1997, pp. 180-197.
-
-
-
-
7
-
-
33749657028
-
-
P. Golle, N. Modadugu, Authenticating streamed data in the presence of random packet loss, in: Proceedings of Network and Distributed System Security Symposium, 2001, pp. 13-22.
-
-
-
-
8
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of database relations
-
Guo H., Li Y., Liu A., and Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176 10 (2006) 1350-1378
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liu, A.3
Jajodia, S.4
-
9
-
-
85061025613
-
-
L. Kerschberg, H. Gomaa, D. Menascé, J.P. Yoon, Data and information architectures for large-scale distributed data intensive information systems, in: Proceedings of 8th International Conference on Statistical and Scientific Database Management, 1996, pp. 226-233.
-
-
-
-
10
-
-
33749670310
-
-
D. Kifer, S. David, J. Gehrke, Detecting change in data streams, in: Proceedings of the VLDB Conference, 2004, pp. 180-191.
-
-
-
-
12
-
-
33749672282
-
-
Y. Li, V. Swarup, S. Jajodia, A robust watermarking scheme for relational data, in: Proceedings of the 13th Workshop on Information Technology and Engineering, 2003, pp. 195-200.
-
-
-
-
13
-
-
33750910367
-
-
C. Lu, H. Liao, L. Chen, Multipurpose audio watermarking, in: Proceedings of the 15th International Conference on Pattern Recognition, 2000, pp. 286-289.
-
-
-
-
14
-
-
0034823295
-
-
S. Miner, J. Staddon, Graph-based authentication of digital streams, in: Proceedings of the IEEE Symposium on Security and Privacy, 2001, pp. 232-246.
-
-
-
-
15
-
-
84883877309
-
-
A. Pannetrat, R. Molva, Authenticating real time packet streams and multicasts, in: Proceedings of the 7th International Symposium on Computers and Communications, 2002, pp. 490-495.
-
-
-
-
16
-
-
33749656264
-
-
A. Pannetrat, R. Molva, Efficient multicast packet authentication, in: Proceedings of Network and Distributed System Security Symposium, 2003, pp. 1-12.
-
-
-
-
17
-
-
84862867186
-
-
J. Park, E. Chong, H. Siegel, Efficient multicast packet authentication using signature amortization, in: Proceedings of IEEE Symposium on Security and Privacy, 2002, pp. 227-240.
-
-
-
-
18
-
-
0033690336
-
-
A. Perrig, J.D. Tygar, D. Song, R. Canetti, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, 2000, pp. 56-73.
-
-
-
-
20
-
-
33645671682
-
-
R. Sion, M. Atallah, S. Prabhakar, Rights protection for discrete numeric streams, in: IEEE Transactions on Knowledge and Data Engineering 18 (5) (2006) 699-714.
-
-
-
|