-
1
-
-
0029464112
-
Techniques for data hiding
-
Bender, W., Gruhl, D., Norimoto, N., "Techniques for data hiding", Proc. of SPIE, 1995.
-
Proc. of SPIE, 1995
-
-
Bender, W.1
Gruhl, D.2
Norimoto, N.3
-
3
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
Boneh, D., "Twenty years of attacks on the RSA cryptosystem", Notices of the AMS, 1999.
-
(1999)
Notices of the AMS
-
-
Boneh, D.1
-
4
-
-
77954024174
-
Collusion-secure fingerprinting for digital data
-
Boneh, D., Shaw, J., "Collusion-secure fingerprinting for digital data", CRYPTO 1995.
-
CRYPTO 1995
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0002391080
-
Untraceable electronic cash
-
Chaum, D., Fiat, A., and Naor, M. "Untraceable electronic cash". Proceedings on Advances in Cryptology (Santa Barbara, California, United States). 1990.
-
Proceedings on Advances in Cryptology (Santa Barbara, California, United States). 1990
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
7
-
-
0004026002
-
-
Morgan Kaufmann Publishers Inc.
-
Cox., I., Miller, M., Bloom, J., "Digital Watermarking", Morgan Kaufmann Publishers Inc., 2001.
-
(2001)
Digital Watermarking
-
-
Miller, M.1
Bloom, J.2
-
8
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
Cox, I., Kilian, J., Leighton, T., Shamoon, T., "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, 1997.
-
(1997)
IEEE Transactions on Image Processing
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
0032074580
-
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
-
Craver, S., Memon, N., Yeo, B. L., and Yeung, M. M. "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications". IEEE Journal. Selec. Areas Comm. 1998.
-
(1998)
IEEE Journal. Selec. Areas Comm.
-
-
Craver, S.1
Memon, N.2
Yeo, B.L.3
Yeung, M.M.4
-
10
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Dingledine, R., Mathewson, N., Syverson, P. "Tor: The Second-Generation Onion Router". Usenix Security Symposium, 2004.
-
Usenix Security Symposium, 2004
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
12
-
-
0005097206
-
Digital Rights Management (DRM) Architectures
-
June
-
Iannella, R., "Digital Rights Management (DRM) Architectures, D-Lib Magazine, June 2001.
-
(2001)
D-Lib Magazine
-
-
Iannella, R.1
-
14
-
-
70349233074
-
Enforcing DRM policies across applications
-
Nair, S., Tanenbaum, A., Gheorghe, G., Crispo, B., "Enforcing DRM policies across applications", Proceedings of the 8th ACM workshop on Digital rights management, 2008.
-
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
-
-
Nair, S.1
Tanenbaum, A.2
Gheorghe, G.3
Crispo, B.4
-
16
-
-
67649659540
-
Private Web Search
-
Saint-Jean, F., Johnson, A., Boneh, D., Feigenbaum, J., "Private Web Search", Proceedings of the 2007 ACM workshop on Privacy in electronic society", 2007.
-
Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society", 2007
-
-
Saint-Jean, F.1
Johnson, A.2
Boneh, D.3
Feigenbaum, J.4
-
18
-
-
0018545449
-
How to Share a Secret
-
Nov
-
Shamir, A., "How to Share a Secret", Communications of the ACM, v 22 n 11, p 612-613, Nov 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|