-
1
-
-
33746371748
-
Fingercasting-Joint fingerprinting and decryption of broadcast messages
-
Batten, L.M. Safavi-Naini, R. (eds.), LNCS, Springer, Heidelberg; Also, Technical Report detailing the ACISP 2006 paper
-
Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136-147. Springer, Heidelberg (2006); Also, Technical Report detailing the ACISP 2006 paper.
-
(2006)
ACISP 2006
, vol.4058
, pp. 136-147
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
2
-
-
84947942283
-
Fingerprinting long forgiving messages
-
Williams, H.C. (ed.), LNCS, Springer, Heidelberg
-
Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180-189. Springer, Heidelberg (1986).
-
(1986)
CRYPTO 1985
, vol.218
, pp. 180-189
-
-
Blakley, G.R.1
Meadows, C.2
Purdy, G.B.3
-
3
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
Zhou, J. Yung, M. Han, Y. (eds.), LNCS, Springer, Heidelberg
-
Choi, J.-G., Sakurai, K., Park, J.-H.: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265-279. Springer, Heidelberg (2003).
-
(2003)
ACNS 2003
, vol.2846
, pp. 265-279
-
-
Choi, J.-G.1
Sakurai, K.2
Park, J.-H.3
-
4
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673-1687 (1997).
-
(1997)
IEEE Trans. on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
7
-
-
35048873815
-
Cryptanalysis of two anonymous buyer-sellerwatermarking protocols and an improvement for true anonymity
-
Jakobsson, M. Yung, M. Zhou, J. (eds.), LNCS, Springer, Heidelberg
-
Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of Two Anonymous Buyer-SellerWatermarking Protocols and an Improvement for True Anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 369-382. Springer, Heidelberg (2004).
-
(2004)
ACNS 2004
, vol.3089
, pp. 369-382
-
-
Goi, B.-M.1
Phan, R.C.-W.2
Yang, Y.3
Bao, F.4
Deng, R.H.5
Siddiqi, M.U.6
-
8
-
-
46749090078
-
An effective and secure buyer-seller watermarking protocol
-
IEEE Computer Society Press, Los Alamitos
-
Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An Effective and Secure Buyer- Seller Watermarking Protocol. In: Third International Symposium on Information Assurance and Security (IAS 2007), pp. 21-26. IEEE Computer Society Press, Los Alamitos (2007).
-
(2007)
Third International Symposium on Information Assurance and Security (IAS 2007)
, pp. 21-26
-
-
Ibrahim, I.M.1
Nour El-Din, S.H.2
Hegazy, A.F.A.3
-
9
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
Lee, P.J. Lim, C.H. (eds.), LNCS, Springer, Heidelberg
-
Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421-432. Springer, Heidelberg (2003).
-
(2003)
ICISC 2002
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
10
-
-
49949091356
-
Combining tardos fingerprinting codes and fingercasting
-
Furon, T. Cayre, F. Döerr, G. Bas, P. (eds.), LNCS, Springer, Heidelberg
-
Katzenbeisser, S., Skorić, B., Celik, M.U., Sadeghi, A.-R.: Combining Tardos Fingerprinting Codes and Fingercasting. In: Furon, T., Cayre, F., Döerr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 294-310. Springer, Heidelberg (2008).
-
(2008)
IH 2007
, vol.4567
, pp. 294-310
-
-
Katzenbeisser, S.1
Skoric, B.2
Celik, M.U.3
Sadeghi, A.-R.4
-
11
-
-
0037796443
-
Resistance of digital watermarks to collusive attacks
-
Department of Computer Science
-
Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98, Princeton University, Department of Computer Science (1988), ftp://ftp.cs.princeton.edu/techreports/1998/585.ps.gz.
-
(1988)
Technical Report TR-585-98, Princeton University
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.G.4
Tarjan, R.E.5
Zane, F.6
-
13
-
-
9744242854
-
An efficient and anonymous buyer-sellerwatermarking protocol
-
Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An Efficient and Anonymous Buyer- SellerWatermarking Protocol. IEEE Trans. on Image Processing 13(12), 1618-1626 (2004).
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
14
-
-
83455204761
-
Multimedia fingerprinting forensics for traitor tracing
-
Hindawi Publishing Corporation
-
Ray Liu, K.J., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communication, vol. 4. Hindawi Publishing Corporation (2005).
-
(2005)
EURASIP Book Series on Signal Processing and Communication
, vol.4
-
-
Ray Liu, K.J.1
Trappe, W.2
Wang, Z.J.3
Wu, M.4
Zhao, H.5
-
16
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Nyberg, K. (ed.), LNCS, Springer, Heidelberg
-
Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308-318. Springer, Heidelberg (1998).
-
(1998)
EUROCRYPT 1998
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.), LNCS, Springer, Heidelberg
-
Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999).
-
(1999)
EUROCRYPT 1999
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
18
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
Stern, J. (ed.), LNCS, Springer, Heidelberg
-
Pfitzmann, B., Sadeghi, A.-R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150-164. Springer, Heidelberg (1999).
-
(1999)
EUROCRYPT 1999
, vol.1592
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
19
-
-
84947921515
-
Asymmetric fingerprinting
-
Maurer, U.M. (ed.), LNCS, Springer, Heidelberg
-
Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84-95. Springer, Heidelberg (1996).
-
(1996)
EUROCRYPT 1996
, vol.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
20
-
-
84957353052
-
Anonymous fingerprinting
-
Fumy, W. (ed.), LNCS, Springer, Heidelberg
-
Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88-102. Springer, Heidelberg (1997).
-
(1997)
EUROCRYPT 1997
, vol.1233
, pp. 88-102
-
-
Pfitzmann, B.1
Waidner, M.2
-
21
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
-
Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer's rights. Journal of Visual Communication and Image Representation 9(3), 194-210 (1998).
-
(1998)
Journal of Visual Communication and Image Representation
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
|