-
1
-
-
18844365338
-
Watermarking relational databases
-
R. Agrawal and J. Kiernan. Watermarking relational databases. In Proceedings of VLDB, pages 155-166, 2002.
-
(2002)
Proceedings of VLDB
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
2
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B. C. Ooi, Y. Yang, and R. Deng. Privacy and ownership preserving of outsourced medical data. In Proceedings of IEEE International Conference on Data Engineering, pages 521-532, 2005.
-
(2005)
Proceedings of IEEE International Conference on Data Engineering
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.4
-
4
-
-
34247340386
-
-
Piracy is unacceptable in the information age or any other age, July 2
-
Coalition Against Database Piracy (CADP). Piracy is unacceptable in the information age or any other age, July 2, 2005. http://cadp.net/defaultasp.
-
(2005)
Coalition Against Database Piracy (CADP)
-
-
-
5
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and Coding, Institute of Mathematics and Its Applications International Conference on Cryp- tography and Coding, Proceedings of IMA 2001
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding - Institute of Mathematics and Its Applications International Conference on Cryp- tography and Coding - Proceedings of IMA 2001, LNCS 2260, pages 360-363, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
0035763272
-
-
S. Craver and S. Katzenbeisser. Security analysis of public-key watermarking schemes. In SPIE 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, pages 172-182, 2001.
-
S. Craver and S. Katzenbeisser. Security analysis of public-key watermarking schemes. In SPIE Vol. 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, pages 172-182, 2001.
-
-
-
-
11
-
-
0034769637
-
-
T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric watermarking schemes. In SPIE 4314, Security and Watermarking of Multimedia Contents III, pages 269-279, 2001.
-
T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric watermarking schemes. In SPIE Vol. 4314, Security and Watermarking of Multimedia Contents III, pages 269-279, 2001.
-
-
-
-
12
-
-
34247403679
-
Database piracy plague
-
March 1
-
B. Gray and J. Gorelick. Database piracy plague. The Washington Times, March 1, 2004. http://www.washingtontimes.com.
-
(2004)
The Washington Times
-
-
Gray, B.1
Gorelick, J.2
-
16
-
-
34247392288
-
-
R. Housley, W. Ford, W. Polk, and D. Solo. Internet x.509 public key infrastructure certificate and crl profile, July 2, 2005. http://www.ietf.org/ rfc/rfc2459.txt.
-
R. Housley, W. Ford, W. Polk, and D. Solo. Internet x.509 public key infrastructure certificate and crl profile, July 2, 2005. http://www.ietf.org/ rfc/rfc2459.txt.
-
-
-
-
20
-
-
19944413957
-
Fingerprinting relational databases: Schemes and specialties
-
Y. Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(1):34-45, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.2
, Issue.1
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
23
-
-
0004179384
-
Efficient certificate revocation
-
Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA
-
S. Micali. Efficient certificate revocation. In Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA, 1996.
-
(1996)
-
-
Micali, S.1
-
32
-
-
19944418626
-
Putting a stop to database piracy
-
September 24, 3048,a= 107965,00.asp
-
L. Vaas. Putting a stop to database piracy. eWEEK, enterprise news and reviews, September 24, 2003. http://www.eweek.com/print_article/0,3048,a= 107965,00.asp.
-
(2003)
eWEEK, enterprise news and reviews
-
-
Vaas, L.1
|