-
1
-
-
84944404911
-
Zero knowledge watermark detection and proof of ownership
-
Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, pp
-
Adelsbach, A. and Sadeghi, A. (2001) 'Zero knowledge watermark detection and proof of ownership', Proceedings of the 4th International Workshop on Information Hiding, LNCS 2137, Pittsburgh, PA, USA, pp.273-288.
-
(2001)
LNCS
, vol.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.2
-
2
-
-
0023408117
-
Processing encrypted data
-
Ahituv, N., Lpid, Y. and Neumann, S. (1987) 'Processing encrypted data', Communications of the ACM, Vol. 30, pp.777-780.
-
(1987)
Communications of the ACM
, vol.30
, pp. 777-780
-
-
Ahituv, N.1
Lpid, Y.2
Neumann, S.3
-
3
-
-
26844480688
-
Anonymous payment in a fair e-commerce protocol with verifiable TTP
-
Trust, Privacy and Security in Digital Business, Springer-Verlag, Copenhagen, Denmark, pp
-
Capellà, M., Gomila, J. and Rotger, L. (2005) 'Anonymous payment in a fair e-commerce protocol with verifiable TTP', Trust, Privacy and Security in Digital Business, LNCS 3592, Springer-Verlag, Copenhagen, Denmark, pp.60-69.
-
(2005)
LNCS
, vol.3592
, pp. 60-69
-
-
Capellà, M.1
Gomila, J.2
Rotger, L.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
Chaum, D. (1981) 'Untraceable electronic mail, return address, and digital pseudonyms', Communications of the ACM, Vol. 24, No. 2, pp.84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
84929273746
-
Untraceable electronic cash
-
California, USA, pp
-
Chaum, D., Fiat, A. and Naor, M. (1990) 'Untraceable electronic cash', Proceedings on Advances in Cryptology, LNCS 403, Sarita Uarbara, California, USA, pp.319-327.
-
(1990)
Proceedings on Advances in Cryptology, LNCS 403, Sarita Uarbara
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
6
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
Proceedings on Applied Cryptography and Network Security, Kunming, China, pp
-
Choi, J.G., Sakurai, K. and Park, J.H. (2003) 'Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party', Proceedings on Applied Cryptography and Network Security, LNCS 2846, Kunming, China, pp.265-279.
-
(2003)
LNCS
, vol.2846
, pp. 265-279
-
-
Choi, J.G.1
Sakurai, K.2
Park, J.H.3
-
7
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, T. and Shamoon, T. (1997) 'Secure spread spectrum watermarking for multimedia', IEEE Transactions on Image Processing, Vol. 6, pp.1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
57849098425
-
Literature survey on digital image watermarking', EE381K Multidimensional
-
Er, H.F. (1998) 'Literature survey on digital image watermarking', EE381K Multidimensional Signal Processing, pp.1-9.
-
(1998)
Signal Processing
, pp. 1-9
-
-
Er, H.F.1
-
10
-
-
0011119853
-
An efficient blind signature scheme for information hiding
-
Fan, C.I. and Chen, W.K. (2001) 'An efficient blind signature scheme for information hiding', International Journal of Electronic Commerce, Vol. 6, No. 1, pp.93-100.
-
(2001)
International Journal of Electronic Commerce
, vol.6
, Issue.1
, pp. 93-100
-
-
Fan, C.I.1
Chen, W.K.2
-
11
-
-
33751433912
-
A lightweight and anonymous copyright protocol
-
Gwoboa, H. and Tzeng, H.C. (2007) 'A lightweight and anonymous copyright protocol', Computer Standards and Interfaces, Vol. 29, pp.229-237.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 229-237
-
-
Gwoboa, H.1
Tzeng, H.C.2
-
12
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Lei, C.L., Yu, P.L., Tsai, P.L. and Chan, M.H. (2004) 'An efficient and anonymous buyer-seller watermarking protocol', IEEE Transactions on Image Processing, Vol. 13, No. 12, pp.1618-1626.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.L.1
Yu, P.L.2
Tsai, P.L.3
Chan, M.H.4
-
13
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Memon, N. and Wong, P.W. (2001) 'A buyer-seller watermarking protocol', IEEE Transactions on Image Processing, Vol. 10, No. 4, pp.643-649.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
14
-
-
33845285852
-
A survey of digital watermarking techniques
-
Frontier Technologies for the Future of Industry and Business, Perth, Western Australia, pp
-
Potdar, V.M., Han, S. and Chang, E. (2005) 'A survey of digital watermarking techniques', 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Perth, Western Australia, pp.709-716.
-
(2005)
3rd International Conference on Industrial Informatics
, pp. 709-716
-
-
Potdar, V.M.1
Han, S.2
Chang, E.3
-
15
-
-
10644266750
-
An anonymous and failure resilient fair-exchange e-commerce protocol
-
Ray, I. and Natarajan, N. (2005) 'An anonymous and failure resilient fair-exchange e-commerce protocol', Decision Support Systems, Vol. 39, No. 3, pp.267-292.
-
(2005)
Decision Support Systems
, vol.39
, Issue.3
, pp. 267-292
-
-
Ray, I.1
Natarajan, N.2
-
16
-
-
0005301490
-
On data banks and privacy homomorphisms
-
DeMillo, R.A. et al, Eds, Academic Press, New York, pp
-
Rivest, R.L., Adleman, L. and Dertouzos, M.L. (1978a) 'On data banks and privacy homomorphisms', in DeMillo, R.A. et al. (Eds.): Foundations of Secure Computation, Academic Press, New York, pp.169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L. (1978b) 'A method for obtaining digital signatures and public key cryptosystems', Communications of ACM, Vol. 21, pp.120-126.
-
(1978)
Communications of ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
0345058967
-
Untraceable fair network payment protocols with off-line TTP
-
Springer-Verlag, Taipei, Taiwan, pp
-
Wang, C.H. (2003) 'Untraceable fair network payment protocols with off-line TTP', Advances in Cryptology - AISACRYPT 2003, Springer-Verlag, Taipei, Taiwan, pp.173-187.
-
(2003)
Advances in Cryptology - AISACRYPT 2003
, pp. 173-187
-
-
Wang, C.H.1
-
20
-
-
77953831178
-
A fair e-cash payment scheme based on credit
-
Xi'an, China, pp
-
Wang, S., Hong, F. and Cui, G. (2005) 'A fair e-cash payment scheme based on credit', Proceedings of the 7th International Conference on Electronic Commerce, ACM Press, Xi'an, China, pp.622-626.
-
(2005)
Proceedings of the 7th International Conference on Electronic Commerce, ACM Press
, pp. 622-626
-
-
Wang, S.1
Hong, F.2
Cui, G.3
-
21
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
Zhang, J., Kou, W. and Fan, K. (2006) 'Secure buyer-seller watermarking protocol', IEE Proceedings on Information Security, Vol. 153, pp.15-18.
-
(2006)
IEE Proceedings on Information Security
, vol.153
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
|