-
1
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir and L. Adelman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, Vol. 21, 1978, pp. 120-126.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
2
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme (extended abstract)
-
Computer Science, Portland, OR, Oct. 21-23
-
J. D. Cohen and M. J. Fischer, "A robust and verifiable cryptographically secure election scheme (extended abstract)," in Proc. IEEE 26th Annu.Symp. Foundations Computer Science, Portland, OR, Oct. 21-23, 1985, pp. 372-382.
-
(1985)
Proc. IEEE 26th Annu.Symp. Foundations
, pp. 372-382
-
-
Cohen, J.D.1
Fischer, M.J.2
-
4
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
Sept
-
L.Qian and K.Nahrstedt, "Watermarking schemes and protocols for protecting rightful ownership and customer's rights," J. Visual Commun. Image Represent., Vol. 9, Sept. 98, pp. 194-210.
-
J. Visual Commun. Image Represent
, vol.9
, Issue.98
, pp. 194-210
-
-
Qian, L.1
Nahrstedt, K.2
-
5
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Memon N. and Wong P.W.: "A buyer-seller watermarking protocol", IEEE Trans. Image Process., Vol. 10, No. 4, 2001, pp. 643-649.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
6
-
-
84949753383
-
On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
-
Sept
-
S. Katzenbeisser, "On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking," in Proc. 12th Int. Workshop Database and Expert Systems Applicat., Sept. 2001, pp. 815-819.
-
(2001)
Proc. 12th Int. Workshop Database and Expert Systems Applicat
, pp. 815-819
-
-
Katzenbeisser, S.1
-
7
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
Lee, P.J, and Lim, C.H, Eds, Proc. ICISC
-
Ju, H.S., Kim, H.J., Lee, D.H., and Lim, J.I.: "An anonymous buyer-seller watermarking protocol with anonymity control", In Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC, LNCS 2587, 2002, pp. 421-432.
-
(2002)
LNCS
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
8
-
-
46749138275
-
-
R. Housley, W. Polk, W. Ford, and D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in RFC 3280, Apr. 2002.
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," in RFC 3280, Apr. 2002.
-
-
-
-
10
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Lei C.-L., Yu P.-L., Tsai P.-L., and Chan M.-H: "An efficient and anonymous buyer-seller watermarking protocol", IEEE Trans. Image Process, Vol. 13, No. 12, 2004, pp. 1618-1626.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
11
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
March
-
J.Zhang, W.Kou and K.Fan: "Secure buyer-seller watermarking protocol", IEE Proc.-Inf. Secur., Vol. 153, No. 1, March 2006.
-
(2006)
IEE Proc.-Inf. Secur
, vol.153
, Issue.1
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
|