-
1
-
-
0003782852
-
Digital Watermarking: Principles & Practice
-
ser, San Mateo, CA: Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, and M. Miller, Digital Watermarking: Principles & Practice, ser. The Morgan Kaufmann Series in Multimedia Information and Systems. San Mateo, CA: Morgan Kaufmann, 2001.
-
(2001)
The Morgan Kaufmann Series in Multimedia Information and Systems
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Miller, M.4
-
3
-
-
0029394108
-
Electronic marking and identification techniques to discourage document copying
-
Oct
-
J. Brassil, S. H. Low, N. F. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying", IEEE J. Sel. Areas Commun., vol. 13, no. 8, pp. 1495-1504, Oct. 1995.
-
(1995)
IEEE J. Sel. Areas Commun.
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.H.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
4
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data", LNCS, vol. 963, pp. 452-465, 1995.
-
(1995)
LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
Jun
-
Z. J. Wang, M. Wu, H. V. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation", IEEE Trans. Image Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.V.3
Trappe, W.4
Liu, K.J.R.5
-
6
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Apr
-
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia", IEEE Trans. Image Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
7
-
-
83455204761
-
Multimedia fingerprinting forensics for traitor tracing
-
ser, New York: Hindawi Publishing Co.
-
K. Liu, W. Trappe, Z. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting Forensics for Traitor Tracing, ser. EURASIP Book Series on Signal Processing and Communications. New York: Hindawi Publishing Co., 2005.
-
(2005)
EURASIP Book Series on Signal Processing and Communications
-
-
Liu, K.1
Trappe, W.2
Wang, Z.3
Wu, M.4
Zhao, H.5
-
8
-
-
0010902349
-
The protection of computer software: Its technology and applications
-
Cambridge, U. K.: Cambridge Univ. Press
-
D. Grover, "The protection of computer software: Its technology and applications", in The British Computer Society Monographs in Informatics. Cambridge, U. K.: Cambridge Univ. Press, 1992.
-
(1992)
The British Computer Society Monographs in Informatics
-
-
Grover, D.1
-
9
-
-
84947942283
-
Fingerprinting long forgiving messages
-
ser. Lecture Notes in Computer Science, H. C. Williams, Ed. New York: Springer
-
G. R. Blakley, C. Meadows, and G. B. Purdy, "Fingerprinting long forgiving messages", in CRYPTO, ser. Lecture Notes in Computer Science, H. C. Williams, Ed. New York: Springer, 1985, vol. 218, pp. 180-189.
-
(1985)
CRYPTO
, vol.218
, pp. 180-189
-
-
Blakley, G.R.1
Meadows, C.2
Purdy, G.B.3
-
10
-
-
84957670625
-
Collusion-secure fingerprinting for digital data (extended abstract)
-
ser. Lecture Notes in Computer Science, D. Coppersmith, Ed. New York: Springer
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data (extended abstract)", in CRYPTO, ser. Lecture Notes in Computer Science, D. Coppersmith, Ed. New York: Springer, 1995, vol. 963, pp. 452-465.
-
(1995)
CRYPTO
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
11
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
Sep
-
L. Qian and K. Nahrstedt, "Watermarking schemes and protocols for protecting rightful ownership and customer's rights", J. Vis. Commun. Image Represent., vol. 9, no. 3, pp. 194-210, Sep. 1998.
-
(1998)
J. Vis. Commun. Image Represent.
, vol.9
, Issue.3
, pp. 194-210
-
-
Qian, L.1
Nahrstedt, K.2
-
14
-
-
0002221784
-
Protocols for collusion-secure asymmetric fingerprinting
-
I. Biehl and B. Meyer, "Protocols for collusion-secure asymmetric fingerprinting", in Proc. 14th STACS LNCS 1200, 1997, pp. 213-222.
-
(1997)
Proc. 14th STACS LNCS 1200
, pp. 213-222
-
-
Biehl, I.1
Meyer, B.2
-
15
-
-
84947903916
-
Proving ownership of digital content
-
ser. Lecture Notes in Computer Science, A. Pfitzmann, Ed. New York: Springer
-
A. Adelsbach, B. Pfitzmann, and A.-R. Sadeghi, "Proving ownership of digital content", in Information Hiding, ser. Lecture Notes in Computer Science, A. Pfitzmann, Ed. New York: Springer, 1999, vol. 1768, pp. 117-133.
-
(1999)
Information Hiding
, vol.1768
, pp. 117-133
-
-
Adelsbach, A.1
Pfitzmann, B.2
Sadeghi, A.-R.3
-
16
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer
-
B. Pfitzmann and A.-R. Sadeghi, "Anonymous fingerprinting with direct non-repudiation", in ASIACRYPT, ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer, 2000, vol. 1976, pp. 401-414.
-
(2000)
ASIACRYPT
, vol.1976
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
17
-
-
84937417240
-
Efficient anonymous fingerprinting with group signatures
-
ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer
-
J. Camenisch, "Efficient anonymous fingerprinting with group signatures", in ASIACRYPT, ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer, 2000, vol. 1976, pp. 415-428.
-
(2000)
ASIACRYPT
, vol.1976
, pp. 415-428
-
-
Camenisch, J.1
-
18
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr
-
N. D. Memon and P. W. Wong, "A buyer-seller watermarking protocol", IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.D.1
Wong, P.W.2
-
19
-
-
35248849802
-
An anonymous buyerseller watermarking protocol with anonymity control
-
Nov
-
H.-S. Ju, H.-J. Kim, D.-H. Lee, and J.-I. Lim, "An anonymous buyerseller watermarking protocol with anonymity control", Inf. Security Cryptology, pp. 421-432, Nov. 2002.
-
(2002)
Inf. Security Cryptology
, pp. 421-432
-
-
Ju, H.-S.1
Kim, H.-J.2
Lee, D.-H.3
Lim, J.-I.4
-
20
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Dec
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol", IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
21
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
mar
-
J. Zhang, W. Kou, and K. Fan, "Secure buyer-seller watermarking protocol", Proc. Inst. Elect. Eng. Information Security, vol. 153, no. 1, pp. 15-18, Mar. 2006.
-
(2006)
Proc. Inst. Elect. Eng. Information Security
, vol.153
, Issue.1
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
-
22
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding", IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Van Der Veen, M.4
Maas, M.5
-
23
-
-
70449671086
-
An efficient buyer-seller watermarking protocol based on composite signal representation
-
Princeton, NJ, New York, ACM
-
M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation", in Proc. 11th ACM Workshop on Multimedia and Security, Princeton, NJ, New York, 2009, pp. 9-18, ACM.
-
(2009)
Proc. 11th ACM Workshop on Multimedia and Security
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
24
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, "Universally Composable Security: A New Paradigm for Cryptographic Protocols", in Proc. 42nd IEEE Symp. Foundations of Computer Science, 2001, pp. 136-145.
-
(2001)
Proc. 42nd IEEE Symp. Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
25
-
-
78649400010
-
Anonymous buyer-seller watermarking protocols-Part II: Efficient implementations
-
submitted for publication
-
M. Deng, T. Bianchi, A. Piva, A. Rial, and B. Preneel, "Anonymous buyer-seller watermarking protocols-Part II: Efficient implementations", IEEE Trans. Inf. Forensics Security, submitted for publication.
-
IEEE Trans. Inf. Forensics Security
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Rial, A.4
Preneel, B.5
-
26
-
-
85024290278
-
Group signatures
-
D. Chaum and E. van Heyst, "Group signatures", in EUROCRYPT, 1991, pp. 257-265.
-
(1991)
EUROCRYPT
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
27
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
ser. Lecture Notes in Computer Science, A. Menezes, Ed. New York: Springer
-
M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups", in CT-RSA, ser. Lecture Notes in Computer Science, A. Menezes, Ed. New York: Springer, 2005, vol. 3376, pp. 136-153.
-
(2005)
CT-RSA
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
28
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption", J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
29
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes", in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
30
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
ser. Lecture Notes in Computer Science, K. Kim, Ed. New York: Springer
-
I. Damgärd and M. Jurik, "A generalisation, a simplification and some applications of paillier's probabilistic public-key system", in Public Key Cryptography, ser. Lecture Notes in Computer Science, K. Kim, Ed. New York: Springer, 2001, pp. 119-136, vol. 1992.
-
(2001)
Public Key Cryptography
, vol.1992
, pp. 119-136
-
-
Damgärd, I.1
Jurik, M.2
-
31
-
-
84983104598
-
On defining proofs of knowledge
-
E. F. Brickell, Ed., Springer-Verlag
-
M. Bellare and O. Goldreich, "On defining proofs of knowledge", in CRYPTO'92, E. F. Brickell, Ed., 1992, vol. 740, pp. 390-420, Springer-Verlag.
-
(1992)
CRYPTO'92
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
32
-
-
24644493543
-
-
ETH, Zürich, Tech. Rep. TR 260, Mar
-
J. Camenisch and M. Stadler, Proof Systems for General Statements About Discrete Logarithms Institute for Theoretical Computer Science, ETH, Zürich, Tech. Rep. TR 260, Mar. 1997.
-
(1997)
Proof Systems for General Statements About Discrete Logarithms Institute for Theoretical Computer Science
-
-
Camenisch, J.1
Stadler, M.2
-
33
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
ser. Lecture Notes in Computer Science, D. Boneh, Ed. New York: Springer
-
J. Camenisch and V. Shoup, "Practical verifiable encryption and decryption of discrete logarithms", in CRYPTO, ser. Lecture Notes in Computer Science, D. Boneh, Ed. New York: Springer, 2003, vol. 2729, pp. 126-144.
-
(2003)
CRYPTO
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
34
-
-
84948969076
-
Fair encryption of RSA keys
-
G. Poupard and J. Stern, "Fair encryption of RSA keys", in EURO-CRYPT, 2000, pp. 172-189.
-
(2000)
EURO-CRYPT
, pp. 172-189
-
-
Poupard, G.1
Stern, J.2
-
37
-
-
33746383345
-
-
Ph. D. dissertation, Université Libre de Bruxelles, Brussels, Belgium
-
S. Kremer, "Formal Analysis of Optimistic Fair Exchange Protocols", Ph. D. dissertation, Université Libre de Bruxelles, Brussels, Belgium, 2004.
-
(2004)
Formal Analysis of Optimistic Fair Exchange Protocols
-
-
Kremer, S.1
-
38
-
-
78649394877
-
-
T. Okamoto, Ed., in, Kyoto, Japan, Dec. 3-7, Springer, ser. Lecture Notes in Computer Science
-
T. Okamoto, Ed., in Proc. 6th Int. Conf. Theory and Application of Cryptology and Information Security, Advances in Cryptology (ASI-ACRYPT 2000), Kyoto, Japan, Dec. 3-7, 2000, vol. 1976, Springer, ser. Lecture Notes in Computer Science.
-
(2000)
Proc. 6th Int. Conf. Theory and Application of Cryptology and Information Security, Advances in Cryptology (ASI-ACRYPT 2000)
, vol.1976
-
-
|