-
1
-
-
40349105021
-
-
Eumetsat, http://www.eumetsat.de/, 2007.
-
(2007)
Eumetsat
-
-
-
2
-
-
0041513205
-
Watermarking Relational Data: Framework, Algorithms and Analysis
-
R. Agrawal, P.J. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," VLDB J., vol. 12, no. 2, pp. 157-169, 2003.
-
(2003)
VLDB J
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
3
-
-
0032162672
-
Collusion-Secure Fingerprinting for Digital Data
-
Sept
-
D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no. 5, pp. 1897-1905, Sept. 1998.
-
(1998)
IEEE Trans. Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
4
-
-
79960570447
-
Why and Where: A Characterization of Data Provenance
-
P. Buneman, S. Khanna, and W.C. Tan, "Why and Where: A Characterization of Data Provenance," Proc. Eighth Int'l Conf. Database Theory (ICDT '01), vol. 1973, pp. 316-330, 2001.
-
(2001)
Proc. Eighth Int'l Conf. Database Theory (ICDT '01)
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
6
-
-
9444291416
-
Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins
-
M. Davide, C. Henning, H. Mohand-Said, A. Troels, and L.H. Legind, "Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins," Proc. Sixth Int'l Conf. Flexible Query Answering Systems (FQAS '04), pp. 348-361, 2004.
-
(2004)
Proc. Sixth Int'l Conf. Flexible Query Answering Systems (FQAS '04)
, pp. 348-361
-
-
Davide, M.1
Henning, C.2
Mohand-Said, H.3
Troels, A.4
Legind, L.H.5
-
11
-
-
84947403595
-
Probability Inequalities for Sums of Bounded Random Variables
-
Mar
-
W. Hoeffding, "Probability Inequalities for Sums of Bounded Random Variables," J. Am. Statistical Assoc., vol. 58, no. 301, pp. 13-30, Mar. 1963.
-
(1963)
J. Am. Statistical Assoc
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
13
-
-
40349110005
-
WATERMILL: Protecting Ownership Rights of Sales Statistics Databases through Watermarking (DEMO)
-
J. Lafaye, "WATERMILL: Protecting Ownership Rights of Sales Statistics Databases through Watermarking (DEMO)," Proc. Bases de Donnés Avancées (BDA '06), 2006.
-
(2006)
Proc. Bases de Donnés Avancées (BDA '06)
-
-
Lafaye, J.1
-
14
-
-
37849008503
-
-
J. Lafaye, D. Gross-Amblard, C. Constantin, M. Guerrouani, and J. Béguec, "WATERMILL: An Optimized Fingerprinting System for Databases," http://watermill.sourceforge.net, 2007.
-
(2007)
WATERMILL: An Optimized Fingerprinting System for Databases
-
-
Lafaye, J.1
Gross-Amblard, D.2
Constantin, C.3
Guerrouani, M.4
Béguec, J.5
-
15
-
-
18844407290
-
Constructing a Virtual Primary Key for Fingerprinting Relational Data
-
Y. Li, V. Swarup, and S. Jajodia, "Constructing a Virtual Primary Key for Fingerprinting Relational Data," Proc. Third ACM Workshop Digital Rights Management (DRM '03), pp. 133-141, 2003.
-
(2003)
Proc. Third ACM Workshop Digital Rights Management (DRM '03)
, pp. 133-141
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
16
-
-
18844455217
-
A Robust Watermarking Scheme for Relational Data
-
Dec
-
Y. Li, V. Swarup, and S. Jajodia, "A Robust Watermarking Scheme for Relational Data," Proc. 13th Workshop Information Technology and Systems (WITS '03), pp. 195-200, Dec. 2003.
-
(2003)
Proc. 13th Workshop Information Technology and Systems (WITS '03)
, pp. 195-200
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
17
-
-
19944413957
-
Fingerprinting Relational Databases: Schemes and Specialties
-
Jan.-Mar
-
Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
18
-
-
33744751840
-
The Boneh-Shaw Fingerprinting Scheme Is Better than We Thought
-
Information Forensics and Security, June
-
H.G. Schaathun, "The Boneh-Shaw Fingerprinting Scheme Is Better than We Thought," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 248-255, June 2006.
-
(2006)
IEEE Trans
, vol.1
, Issue.2
, pp. 248-255
-
-
Schaathun, H.G.1
-
20
-
-
40349092220
-
Watermarking Relational Databases Using Optimization Based Techniques,
-
Technical Report 41, CERIAS, 2006
-
M. Shehab, E. Bertino, and A. Ghafoor, "Watermarking Relational Databases Using Optimization Based Techniques," Technical Report 41, CERIAS, 2006.
-
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
21
-
-
1142303694
-
Rights Protection for Relational Data
-
R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," Proc. ACM SIGMOD '03, pp. 98-109, 2003.
-
(2003)
Proc. ACM SIGMOD '03
, pp. 98-109
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
22
-
-
10944220833
-
Rights Protection for Relational Data
-
Dec
-
R. Sion, M.J. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 12, pp. 1509-1525, Dec. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng
, vol.16
, Issue.12
, pp. 1509-1525
-
-
Sion, R.1
Atallah, M.J.2
Prabhakar, S.3
|