-
1
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Topics in Cryptology, Eurocrypt 2003, Springer-Verlag
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Topics in Cryptology - Eurocrypt 2003, LNCS 2656, pages 614-629. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
2
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Topics in Cryptology, CT-RSA 2005, Springer-Verlag
-
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136-153. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
3
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. LNCS 963, pages 452-465, 1995.
-
(1995)
LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
4
-
-
84937417240
-
Efficient anonymous fingerprinting with group signatures
-
ASIACRYPT, Springer-Verlag
-
J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428. Springer-Verlag, 2000.
-
(1976)
LNCS
, pp. 415-428
-
-
Camenisch, J.1
-
5
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Adv. in Cryptology, Crypto 2003, Springer-Verlag
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Adv. in Cryptology - Crypto 2003, LNCS 2729, pages 126-144. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
6
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673-1687, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
7
-
-
85084161366
-
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In In Proceedings of the 13th USENIX Security Symposium, pages 303-320, August 2004.
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In In Proceedings of the 13th USENIX Security Symposium, pages 303-320, August 2004.
-
-
-
-
8
-
-
35048873815
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
-
Applied Cryptography and Network Security
-
B.-M. Goi, R. C.-W. Phan, Y. Yang, F. Bao, R. H. Deng, and M. U. Siddiqi. Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In Applied Cryptography and Network Security, LNCS 2587, pages 369-382, 2004.
-
(2004)
LNCS
, vol.2587
, pp. 369-382
-
-
Goi, B.-M.1
Phan, R.C.-W.2
Yang, Y.3
Bao, F.4
Deng, R.H.5
Siddiqi, M.U.6
-
9
-
-
0242372124
-
Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party
-
Applied Cryptography and Network Security
-
J.-H. P. Jae-Gwi Choi, Kouichi Sakurai. Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. In Applied Cryptography and Network Security, LNCS 2846, pages 265-279, 2003.
-
(2003)
LNCS
, vol.2846
, pp. 265-279
-
-
Jae-Gwi Choi, J.-H.P.1
Sakurai, K.2
-
10
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
November
-
H.-S. Ju, H.-J. Kim, D.-H. Lee, and J.-I. Lim. An anonymous buyer-seller watermarking protocol with anonymity control. Information Security and Cryptology - ICISC, pages 421-432, November 2002.
-
(2002)
Information Security and Cryptology - ICISC
, pp. 421-432
-
-
Ju, H.-S.1
Kim, H.-J.2
Lee, D.-H.3
Lim, J.-I.4
-
11
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
4th International Workshop on Practice and Theory in Public-Key Cryptography, Springer-Verlag
-
I. D. M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136. Springer-Verlag, 2001.
-
(1992)
LNCS
, pp. 119-136
-
-
Jurik, I.D.M.1
-
12
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618-1626, 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
14
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology EUROCRYPT'99, Springer-Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology EUROCRYPT'99, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
Advances in Cryptology EUROCRYPT'99, Springer-Verlag
-
B. Pfitzmann and A.-R. Sadeghi. Coin-based anonymous fingerprinting. In Advances in Cryptology EUROCRYPT'99, LNCS 1592, pages 150-164. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
16
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
Advances in Cryptology ASIACRYPT '00, Springer-Verlag
-
B. Pfitzmann and A.-R. Sadeghi. Anonymous fingerprinting with direct non-repudiation. In Advances in Cryptology ASIACRYPT '00, LNCS 1976, pages 401-414. Springer-Verlag, 2000.
-
(1976)
LNCS
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
18
-
-
84947921515
-
Asymmetric fngerprinting
-
Advances in Cryptology EUROCRYPT'96, Springer-Verlag
-
B. Pittzmann and M. Schunter. Asymmetric fngerprinting. In Advances in Cryptology EUROCRYPT'96, LNCS 1070, pages 84-95. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 84-95
-
-
Pittzmann, B.1
Schunter, M.2
-
19
-
-
37349092081
-
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
-
Trust, Privacy and Security in Digital Business, August
-
M.-H. Shao. A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, LNCS 4657, pages 44-53, August 2007.
-
(2007)
LNCS
, vol.4657
, pp. 44-53
-
-
Shao, M.-H.1
-
20
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
March
-
J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. In IEE Proceedings Information Security, volume 153, pages 15-18, March 2006.
-
(2006)
IEE Proceedings Information Security
, vol.153
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
|