-
1
-
-
84947921901
-
Chameleon-A new kind of stream cipher
-
London, U.K.
-
R. J. Anderson and C. Manifavas, "Chameleon-A new kind of stream cipher," in Proc. 4th Int. Workshop Fast Software Encryption, London, U.K., 1997, pp. 107-113.
-
(1997)
Proc. 4th Int. Workshop Fast Software Encryption
, pp. 107-113
-
-
Anderson, R.J.1
Manifavas, C.2
-
2
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short signatures from the weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
3
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
Sep.
-
M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen, "Lookup-table-based secure client-side embedding for spread-spectrum watermarks," IEEE Trans. Inf. Forensics Security, vol.3, no.3, pp. 475-487, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.U.1
Lemma, A.N.2
Katzenbeisser, S.3
Veen Der M.Van4
-
4
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug.
-
G.-H. Chiou and W.-T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol.15, no.8, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Trans. Softw. Eng.
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.-H.1
Chen, W.-T.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
8
-
-
57849116994
-
Buyer-sellerwatermarking protocols with off-line trusted third parties
-
C.-I. Fan, M.-T. Chen, and W.-Z. Sun, "Buyer-sellerwatermarking protocols with off-line trusted third parties," Int. J. Ad Hoc Ubiquitous Comput., vol.4, no.1, pp. 36-43, 2009.
-
(2009)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.4
, Issue.1
, pp. 36-43
-
-
Fan, C.-I.1
Chen, M.-T.2
Sun, W.-Z.3
-
9
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol.66, no.3, pp. 283-301, 1998.
-
(1998)
Signal Process
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
10
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul.
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," in Proc. IEEE, Jul. 1999, vol.87, no.7, pp. 1079-1107.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
11
-
-
33750960705
-
Key distribution scheme based on two cryptosystems for hierarchical access control
-
Feb. 20-22
-
B. Hu, W. Ye, S.-L. Feng, X.-L. Wang, and X. Xie, "Key distribution scheme based on two cryptosystems for hierarchical access control," in ICACT 2006, Feb. 20-22, 2006, pp. 1723-1728.
-
(2006)
ICACT 2006
, pp. 1723-1728
-
-
Hu, B.1
Ye, W.2
Feng, S.-L.3
Wang, X.-L.4
Xie, X.5
-
12
-
-
4444247533
-
Modeling and implementation of digital rights
-
S. O. Hwang, K. S. Yoon, K. P. Jun, and K. H. Lee, "Modeling and implementation of digital rights," J. Syst. Softw., vol.73, no.3, pp. 533-549, 2004.
-
(2004)
J. Syst. Softw.
, vol.73
, Issue.3
, pp. 533-549
-
-
Hwang, S.O.1
Yoon, K.S.2
Jun, K.P.3
Lee, K.H.4
-
13
-
-
33750560169
-
Attacks and forensic analysis for multimedia content protection
-
Amsterdam
-
H. Jin and J. Lotspiech, "Attacks and forensic analysis for multimedia content protection," in Proc. Int. Conf. Multimedia Expo (ICME 2005), Amsterdam, 2005, pp. 1392-1395.
-
(2005)
Proc. Int. Conf. Multimedia Expo (ICME 2005)
, pp. 1392-1395
-
-
Jin, H.1
Lotspiech, J.2
-
15
-
-
35248849802
-
An anonymous buyerseller watermarking protocol with anonymity control
-
Seoul, Korea
-
H. S. Ju, H. J. Kim, D. H. Lee, and J. I. Lim, "An anonymous buyerseller watermarking protocol with anonymity control," in Information Security Cryptology (ICISC), Seoul, Korea, 2002, vol.2587/2003, pp. 421-432.
-
(2002)
Information Security Cryptology (ICISC)
, vol.2587
, Issue.2003
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
17
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec.
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. Inf. Forensics Security, vol.3, no.4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Veen Der M.Van4
Maas, M.5
-
18
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun.
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," in Proc. IEEE, Jun. 2004, vol.92, pp. 918-932.
-
(2004)
Proc. IEEE
, vol.92
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
19
-
-
0035307977
-
A buyer seller watermarking protocol
-
Apr.
-
N. Memon and P. W. Wong, "A buyer seller watermarking protocol," IEEE Trans. Image Process., vol.10, no.4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
20
-
-
84944878354
-
-
Boca Raton, FL: CRC Press
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996, pp. 610-612.
-
(1996)
Handbook of Applied Cryptography
, pp. 610-612
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
21
-
-
33744721541
-
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
-
Canada, May 23-25
-
H. Muratani, "Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring," in Proc. IH 2004, Canada, May 23-25, 2004, pp. 282-292.
-
(2004)
Proc. IH 2004
, pp. 282-292
-
-
Muratani, H.1
-
22
-
-
63749101051
-
Privacy preserving multiparty multilevel DRM architecture
-
Las Vegas, NV
-
A. Sachan, S. Emmanuel, A. Das, and M. Kankanhalli, "Privacy preserving multiparty multilevel DRM architecture," in Proc. Consumer Communications and Networking Conf., Las Vegas, NV, 2009, pp. 1-5.
-
(2009)
Proc. Consumer Communications and Networking Conf.
, pp. 1-5
-
-
Sachan, A.1
Emmanuel, S.2
Das, A.3
Kankanhalli, M.4
-
23
-
-
70450228510
-
Secure multimedia content delivery with multiparty multilevelDRMarchitecture
-
Williamsburg, VA
-
T. Thomas, S. Emmanuel, A. Das, and M. S. Kankanhalli, "Secure multimedia content delivery with multiparty multilevelDRMarchitecture," in Proc. 18th Int. Workshop Network and Operating Systems Support for Digital Audio and Video, Williamsburg, VA, 2009, pp. 85-90.
-
(2009)
Proc. 18th Int. Workshop Network and Operating Systems Support for Digital Audio and Video
, pp. 85-90
-
-
Thomas, T.1
Emmanuel, S.2
Das, A.3
Kankanhalli, M.S.4
-
24
-
-
85032751127
-
Mean squared error: Lot it or leave it? A new look at signal fidelity measures
-
Jan.
-
Z. Wang and A. C. Bovik, "Mean squared error: Lot it or leave it? A new look at signal fidelity measures," IEEE Signal Process. Mag., vol.26, no.1, pp. 98-117, Jan. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.1
, pp. 98-117
-
-
Wang, Z.1
Bovik, A.C.2
|