-
1
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
DOI=http://dx.doi.org/10.1007/s00778-003-0097-x, Aug
-
Agrawal, R., Haas, P., and Kiernan, J. 2003. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 2 (Aug. 2003), 157-169. DOI=http://dx.doi.org/10.1007/s00778-003-0097-x
-
(2003)
The VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.2
Kiernan, J.3
-
2
-
-
34247371496
-
-
Li, Y. and Deng, R. H. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security (Taipei, Taiwan, March 21-24, 2006). ASIACCS '06. ACM, New York, NY, 78-89. DOI=http://doi.acm.org/10. 1145/1128817.1128832
-
Li, Y. and Deng, R. H. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security (Taipei, Taiwan, March 21-24, 2006). ASIACCS '06. ACM, New York, NY, 78-89. DOI=http://doi.acm.org/10. 1145/1128817.1128832
-
-
-
-
3
-
-
35248861089
-
-
Zhou, X., Huang, M., and Peng, Z. 2007. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, March 11-15, 2007). SAC '07. ACM, New York, NY, 254-258. DOI=http://doi.acm. org/10.1145/1244002.1244066
-
Zhou, X., Huang, M., and Peng, Z. 2007. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, March 11-15, 2007). SAC '07. ACM, New York, NY, 254-258. DOI=http://doi.acm. org/10.1145/1244002.1244066
-
-
-
-
4
-
-
6444231864
-
Watermarking Relational Database Using Image
-
Shanghai, August 26-29
-
Zhang, Z., Jin, X., Wang, J., Li, D. 2004. Watermarking Relational Database Using Image. In Proceedings of the Third International Conference on Machine Leaning and Cybernetics, (Shanghai, August 26-29, 2004).
-
(2004)
Proceedings of the Third International Conference on Machine Leaning and Cybernetics
-
-
Zhang, Z.1
Jin, X.2
Wang, J.3
Li, D.4
-
5
-
-
84957877979
-
Attacks on Copyright Marking Systems
-
Proceedings of the Second international Workshop on information Hiding April 14-17, D. Aucsmith, Ed, Springer-Verlag, London
-
Petitcolas, F. A., Anderson, R. J., and Kuhn, M. G. 1998. Attacks on Copyright Marking Systems. In Proceedings of the Second international Workshop on information Hiding (April 14-17, 1998). D. Aucsmith, Ed. Lecture Notes In Computer Science, vol. 1525. Springer-Verlag, London, 218-238.
-
(1998)
Lecture Notes In Computer Science
, vol.1525
, pp. 218-238
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
6
-
-
1142303694
-
-
Sion, R., Atallah, M., and Prabhakar, S. 2003. Rights protection for relational data. In Proceedings of the 2003 ACM SIGMOD international Conference on Management of Data (San Diego, California, June 09-12, 2003). SIGMOD '03. ACM, New York, NY, 98-109. DOI=http://doi.acm.org/10.1145/872757. 872772
-
Sion, R., Atallah, M., and Prabhakar, S. 2003. Rights protection for relational data. In Proceedings of the 2003 ACM SIGMOD international Conference on Management of Data (San Diego, California, June 09-12, 2003). SIGMOD '03. ACM, New York, NY, 98-109. DOI=http://doi.acm.org/10.1145/872757. 872772
-
-
-
-
7
-
-
34248225546
-
-
Yong, Z., Xia-mu, N., Khan, A., Qiong, L., and Qi, H. 2006. A novel method of watermarking relational databases using character string. In Proceedings of the 24th IASTED international Conference on Artificial intelligence and Applications (Innsbruck, Austria, February 13-16, 2006). V. Deved, Ed. International Association Of Science And Technology For Development. ACTA Press, Anaheim, CA, 120-124.
-
Yong, Z., Xia-mu, N., Khan, A., Qiong, L., and Qi, H. 2006. A novel method of watermarking relational databases using character string. In Proceedings of the 24th IASTED international Conference on Artificial intelligence and Applications (Innsbruck, Austria, February 13-16, 2006). V. Deved, Ed. International Association Of Science And Technology For Development. ACTA Press, Anaheim, CA, 120-124.
-
-
-
-
8
-
-
70449832148
-
-
Anderson, R. J. 2001 Security Engineering: a Guide to Building Dependable Distributed Systems. 1st. John Wiley & Sons, Inc.
-
Anderson, R. J. 2001 Security Engineering: a Guide to Building Dependable Distributed Systems. 1st. John Wiley & Sons, Inc.
-
-
-
-
9
-
-
38049098570
-
-
Springer
-
Fu, Y., Jin C., and Ma, C. 2007. A Novel Relational Database Watermarking Algorithm. Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 4430. Springer, 208-219.
-
(2007)
A Novel Relational Database Watermarking Algorithm. Intelligence and Security Informatics. Lecture Notes in Computer Science
, vol.4430
, pp. 208-219
-
-
Fu, Y.1
Jin, C.2
Ma, C.3
|