-
2
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
Barg, A., Blakley, G.R. and Kabatiansky, G. (2003) 'Digital fingerprinting codes: problem statements, constructions, identification of traitors', IEEE Trans. Inform. Theory, Vol. 49, No. 4, pp.852-865.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
3
-
-
0036028058
-
Cryptographic methods for collusion-secure fingerprinting of digital data
-
Biehl, I. and Meyer, B. (2002) 'Cryptographic methods for collusion-secure fingerprinting of digital data', Computers and Electrical Engineering, Vol. 28, No. 1, pp.59-75.
-
(2002)
Computers and Electrical Engineering
, vol.28
, Issue.1
, pp. 59-75
-
-
Biehl, I.1
Meyer, B.2
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Boneh, D. and Shaw, J. (1998) 'Collusion-secure fingerprinting for digital data', IEEE Trans. Inform. Theory, Vol. 44, No. 5, pp.1897-1905.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0032712929
-
PKI, elliptic curve cryptography and digital signatures
-
Caelli, W.J. et al. (1999) 'PKI, elliptic curve cryptography and digital signatures', Computers & Security, Vol. 18, No. 1, pp.47-66.
-
(1999)
Computers & Security
, vol.18
, Issue.1
, pp. 47-66
-
-
Caelli, W.J.1
-
6
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
Celik, M. et al .(2008) 'Lookup-table-based secure client-side embedding for spread-spectrum watermarks', IEEE Trans. Inform. Theory, Vol. 3, No. 3, pp.475-487.
-
(2008)
IEEE Trans. Inform. Theory
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.1
-
7
-
-
0035009221
-
Modeling the branching characteristics and efficiency gains in global multicast trees
-
Chalmers, R.C. and Almeroth, K.C. (2001) 'Modeling the branching characteristics and efficiency gains in global multicast trees', InfoCom 2001, pp.449-458.
-
(2001)
InfoCom
, vol.2001
, pp. 449-458
-
-
Chalmers, R.C.1
Almeroth, K.C.2
-
8
-
-
33646177190
-
Fast elliptic curve point multiplication using doublebase chains
-
Report 2005/069
-
Dimitrov, V.S. (2005) 'Fast elliptic curve point multiplication using doublebase chains', Cryptology ePrint Archive, Report 2005/069.
-
(2005)
Cryptology ePrint Archive
-
-
Dimitrov, V.S.1
-
9
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Kundur, D. (2004) 'Video fingerprinting and encryption principles for digital rights management', Proceedings of the IEEE, Vol. 92, No. 6, pp.918-932.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
-
10
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Kuribayashi, M. and Tanaka, H. (2005) 'Fingerprinting protocol for images based on additive homomorphic property', IEEE Transactions on Image Processing, Vol. 14, No. 12, pp.2129-2139.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
12
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Washington, DC
-
Naor, M. and Pinkas, B. (2001) 'Efficient oblivious transfer protocols', Proceedings of 12th SIAM Symposium on Discrete Algorithms (SODA 2001), Washington, DC, pp.448-457.
-
(2001)
Proceedings of 12th SIAM Symposium on Discrete Algorithms (SODA 2001)
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
37649018591
-
Anonymous fingerprinting with robust QIM watermarking techniques
-
Prins, J.P., Erkin, Z. and Lagendijk, R.L. (2007) 'Anonymous fingerprinting with robust QIM watermarking techniques', EURASIP J. Inform. Security, Vol. 2007, No. 8, pp.1-7.
-
(2007)
EURASIP J. Inform. Security
, vol.2007
, Issue.8
, pp. 1-7
-
-
Prins, J.P.1
Erkin, Z.2
Lagendijk, R.L.3
-
16
-
-
0003462641
-
-
Technical Report TR-81, Aitken Computation Laboratory Harvard University
-
Rabin, M. (1981) 'How to exchange secrets by oblivious transfer', Technical Report TR-81, Aitken Computation Laboratory, Harvard University.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
18
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
Tardos, G. (2008) 'Optimal probabilistic fingerprint codes', Journal of the ACM (JACM), Vol. 55, No. 2, pp.1-24.
-
(2008)
Journal of the ACM (JACM)
, vol.55
, Issue.2
, pp. 1-24
-
-
Tardos, G.1
-
19
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Trappe, W. et al. (2003) 'Anti-collusion fingerprinting for multimedia', IEEE Trans. Signal Process, Vol. 51, No. 4, pp.1069-1087.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
|