-
1
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Topics in Cryptology, CT-RSA 2005, Springer-Verlag
-
Bellare, M., Shi, H., and Zhang, C. (2005). Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136-153. Springer-Verlag.
-
(2005)
LNCS
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
3
-
-
0002221784
-
Protocols for collusionsecure asymmetric fingerprinting
-
Proc. 14th STACS, Springer-Verlag
-
Biehl, I. and Meyer, B. (1997). Protocols for collusionsecure asymmetric fingerprinting. In Proc. 14th STACS, LNCS 1200, pages 213-222. Springer-Verlag.
-
(1997)
LNCS
, vol.1200
, pp. 213-222
-
-
Biehl, I.1
Meyer, B.2
-
4
-
-
84947942283
-
Fingerprinting long forgiving messages
-
Advances in Cryptology, CRYPTO 85, Springer-Verlag
-
Blakley, G. R., Meadows, C., and Prudy, G. B. (1985). Fingerprinting long forgiving messages. In Advances in Cryptology - CRYPTO 85, LNCS 218, pages 180-189. Springer-Verlag.
-
(1985)
LNCS
, vol.218
, pp. 180-189
-
-
Blakley, G.R.1
Meadows, C.2
Prudy, G.B.3
-
5
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
Boneh, D. and Shaw, J. (1995). Collusion-secure fingerprinting for digital data. LNCS 963, pages 452-465.
-
(1995)
LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
84937417240
-
Efficient anonymous fingerprinting with group signatures
-
ASIACRYPT, Springer-Verlag
-
Camenisch, J. (2000). Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428. Springer-Verlag.
-
(2000)
LNCS 1976
, pp. 415-428
-
-
Camenisch, J.1
-
7
-
-
0012647694
-
Verifiable encryption and applications to group signatures and signature sharing
-
Camenisch, J. and Damgård, I. (1998). Verifiable encryption and applications to group signatures and signature sharing. In Technical Report RS-98-32, BRICS, Department of Computer Science, University of Aarhus.
-
(1998)
Technical Report RS-98-32, BRICS, Department of Computer Science, University of Aarhus
-
-
Camenisch, J.1
Damgård, I.2
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12): 1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
35048873815
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
-
Applied Cryptography and Network Security
-
Goi, B.-M., Phan, R. C.-W., Yang, Y., Bao, F., Deng, R. H., and Siddiqi, M. U. (2004). Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In Applied Cryptography and Network Security, LNCS 2587, pages 369-382.
-
(2004)
LNCS
, vol.2587
, pp. 369-382
-
-
Goi, B.-M.1
Phan, R.C.-W.2
Yang, Y.3
Bao, F.4
Deng, R.H.5
Siddiqi, M.U.6
-
12
-
-
46749090078
-
-
Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A. (2007). An effective and secure buyer-seller watermarking protocol. In Third International Symposium on Information Assurance and Security, 2007. IAS 2007, pages 21-28.
-
Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A. (2007). An effective and secure buyer-seller watermarking protocol. In Third International Symposium on Information Assurance and Security, 2007. IAS 2007, pages 21-28.
-
-
-
-
13
-
-
0242372124
-
Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party
-
Applied Cryptography and Network Security
-
Jae-Gwi Choi, Kouichi Sakurai, J.-H. P. (2003). Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. In Applied Cryptography and Network Security, LNCS 2846, pages 265-279.
-
(2003)
LNCS
, vol.2846
, pp. 265-279
-
-
Choi, J.-G.1
-
14
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
Ju, H.-S., Kim, H.-J., Lee, D.-H., and Lim, J.-I. (2002). An anonymous buyer-seller watermarking protocol with anonymity control. Information Security and Cryptology - ICISC, pages 421-432.
-
(2002)
Information Security and Cryptology - ICISC
, pp. 421-432
-
-
Ju, H.-S.1
Kim, H.-J.2
Lee, D.-H.3
Lim, J.-I.4
-
15
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
4th International Workshop on Practice and Theory in Public-Key Cryptography, Springer-Verlag
-
Jurik, I. D. M. (2001). A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136. Springer-Verlag.
-
(1992)
LNCS
, pp. 119-136
-
-
Jurik, I.D.M.1
-
16
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Kuribayashi, M. and Tanaka, H. (2005). Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing, 14(12):2129-2139.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
17
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H. (2004). An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618-1626.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
18
-
-
83455204761
-
Multimedia Fingerprinting Forensics for Traitor Tracing
-
Hindawi Publishing Co
-
Liu, K., Trappe, W., Wang, Z., Wu, M., and Zhao, H. (2005). Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Co.
-
(2005)
EURASIP Book Series on Signal Processing and Communications
-
-
Liu, K.1
Trappe, W.2
Wang, Z.3
Wu, M.4
Zhao, H.5
-
21
-
-
84956852274
-
A new publickey cryptosystem as secure as factoring
-
Advances in Cryptology, EUROCRYPT'98, Springer-Verlag
-
Okamoto, T. and Uchiyama, S. (1998). A new publickey cryptosystem as secure as factoring. In Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pages 308-318. Springer-Verlag.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology, EUROCRYPT'99, Springer-Verlag
-
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pages 223-238. Springer-Verlag.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
Advances in Cryptology, EUROCRYPT'99, Springer-Verlag
-
Pfitzmann, B. and Sadeghi, A.-R. (1999). Coin-based anonymous fingerprinting. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pages 150-164. Springer-Verlag.
-
(1999)
LNCS
, vol.1592
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
24
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
Advances in Cryptology, ASIACRYPT'00, Springer-Verlag
-
Pfitzmann, B. and Sadeghi, A.-R. (2000). Anonymous fingerprinting with direct non-repudiation. In Advances in Cryptology - ASIACRYPT'00, LNCS 1976, pages 401-414. Springer-Verlag.
-
(2000)
LNCS 1976
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
26
-
-
84947921515
-
Asymmetric fngerprinting
-
Advances in Cryptology, EUROCRYPT'96, Springer-Verlag
-
Pittzmann, B. and Schunter, M. (1996). Asymmetric fngerprinting. In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pages 84-95. Springer-Verlag.
-
(1996)
LNCS
, vol.1070
, pp. 84-95
-
-
Pittzmann, B.1
Schunter, M.2
-
27
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
Qiao, L. and Nahrstedt, K. (1998). Watermarking schemes and protocols for protecting rightful ownership and customer's rights. Journal of Visual Communication and Image Representation, 9(3): 194-210.
-
(1998)
Journal of Visual Communication and Image Representation
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
28
-
-
0038527384
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
Trappe, W., Wu, M., Wang, Z. J., and Liu, K. J. R. (2003). Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing, 51(4): 1069-1087.
-
(2003)
IEEE Transactions on Image Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
29
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
Wang, Z. J., Wu, M., Zhao, H. V., Trappe, W., and Liu, K. J. R. (2005). Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing, 14(6):804-821.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.V.3
Trappe, W.4
Liu, K.J.R.5
-
30
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
Zhang, J., Kou, W., and Fan, K. (2006). Secure buyer-seller watermarking protocol. In IEE Proceedings Information Security, volume 153, pages 15-18.
-
(2006)
IEE Proceedings Information Security
, vol.153
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
|