-
1
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Topics in Cryptology, CT-RSA 2005
-
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136-153, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
2
-
-
56749182537
-
Efficient pointwise and blockwise encrypted operations
-
Oxford, UK
-
T. Bianchi, A. Piva, and M. Barni. Efficient pointwise and blockwise encrypted operations. In Proc. of ACM Multimedia & Security Workshop 2008, pages 85-90, Oxford, UK, 2008.
-
(2008)
Proc. of ACM Multimedia & Security Workshop
, pp. 85-90
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
3
-
-
84937417240
-
Efficient anonymous fingerprinting with group signatures
-
ASIACRYPT
-
J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428, 2000.
-
(1976)
LNCS
, pp. 415-428
-
-
Camenisch, J.1
-
4
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspects
-
J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In proceedings of SCN'04, pages 120-133, 2005.
-
(2005)
proceedings of SCN'04
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
5
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Adv. in Cryptology, EUROCRYPT 1999
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Adv. in Cryptology - EUROCRYPT 1999, LNCS 1592, pages 106-121, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 106-121
-
-
Camenisch, J.1
Michels, M.2
-
6
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Adv. in Cryptology, CRYPTO 2003
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Adv. in Cryptology - CRYPTO 2003, LNCS 2729, pages 126-144, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
7
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4):1423-1443, May 2001.
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
8
-
-
0032625842
-
Watermarking as communications with side information
-
July
-
I. J. Cox, M. L. Miller, and A. L. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, 87(7):1127-1141, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
9
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography, of
-
R. Cramer, I. Damgard, and P. Mackenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography, volume 1751 of LNCS, pages 354-372, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 354-372
-
-
Cramer, R.1
Damgard, I.2
Mackenzie, P.3
-
10
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
-
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573-586, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
11
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
4th International Workshop on Practice and Theory in Public-Key Cryptography
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136, 2001.
-
(1992)
LNCS
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
13
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Adv. in Cryptology, CRYPTO 84
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Adv. in Cryptology - CRYPTO 84, LNCS 196, pages 10-18, 1985.
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
14
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Article ID 78943, 20
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, Article ID 78943, 20 pages, 2007.
-
(2007)
EURASIP Journal on Information Security
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
15
-
-
0032218232
-
An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
-
San Francisco, CA, Nov
-
R. Gennaro, D. Micciancio, and T. Rabin. An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products. In 5th ACM Conference on Computer and Communication Security (CCS'98), pages 67-72, San Francisco, CA, Nov. 1998.
-
(1998)
5th ACM Conference on Computer and Communication Security (CCS'98)
, pp. 67-72
-
-
Gennaro, R.1
Micciancio, D.2
Rabin, T.3
-
16
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. on Information Forensics and Security, 3(4):783-786, Dec. 2008.
-
(2008)
IEEE Trans. on Information Forensics and Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
van der Veen, M.4
Maas, M.5
-
17
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Dec
-
M. Kuribayashi and H. Tanaka. Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. on Image Processing, 14(12):2129-2139, Dec. 2005.
-
(2005)
IEEE Trans. on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
18
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing, 13(12):1618-1626, 2004.
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
19
-
-
0035307977
-
A buyer-seller watermarking protocol
-
N. D. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEE Trans. on Image Proc., 10(4):643-649, 2001.
-
(2001)
IEEE Trans. on Image Proc
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.D.1
Wong, P.W.2
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Adv. in Cryptology, EUROCRYPT'99
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Adv. in Cryptology - EUROCRYPT'99, LNCS 1592, pages 223-238, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
21844445258
-
Rational dither modulation: A high-rate data-hiding method invariant to gain attacks
-
Oct
-
F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. on Signal Processing, 53(10):3960-3975, Oct. 2005.
-
(2005)
IEEE Trans. on Signal Processing
, vol.53
, Issue.10
, pp. 3960-3975
-
-
Perez-Gonzalez, F.1
Mosquera, C.2
Barni, M.3
Abrardo, A.4
-
23
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
Adv. in Cryptology, ASIACRYPT '00
-
B. Pfitzmann and A.-R. Sadeghi. Anonymous fingerprinting with direct non-repudiation. In Adv. in Cryptology - ASIACRYPT '00, LNCS 1976, pages 401-414, 2000.
-
(1976)
LNCS
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
24
-
-
84947921515
-
Asymmetric fingerprinting
-
Adv. in Cryptology, EUROCRYPT'96
-
B. Pittzmann and M. Schunter. Asymmetric fingerprinting. In Adv. in Cryptology - EUROCRYPT'96, LNCS 1070, pages 84-95, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 84-95
-
-
Pittzmann, B.1
Schunter, M.2
-
25
-
-
84948969076
-
Fair encryption of RSA keys
-
Adv. in Cryptology, EUROCRYPT'00
-
G. Poupard and J. Stern. Fair encryption of RSA keys. In Adv. in Cryptology - EUROCRYPT'00, LNCS 1807, pages 172-190, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 172-190
-
-
Poupard, G.1
Stern, J.2
-
26
-
-
37649018591
-
Anonymous fingerprinting with robust QIM watermarking techniques
-
Article ID 31340, 13
-
J. P. Prins, Z. Erkin, and R. L. Lagendijk. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security, 2007, Article ID 31340, 13 pages, 2007.
-
(2007)
EURASIP Journal on Information Security, 2007
-
-
Prins, J.P.1
Erkin, Z.2
Lagendijk, R.L.3
|