-
1
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
J. Zhou, M. Yung, & Y. Han (Eds.) Berlin: Springer
-
Choi, J. G., Sakurai, K., & Park, J. H. (2003). Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In J. Zhou, M. Yung, & Y. Han (Eds.), Applied cryptography and network security-ACNS 2003, Lecture Notes in Computer Science (Vol. 2846, pp. 265-279). Berlin: Springer.
-
(2003)
Applied Cryptography and Network Security-ACNS 2003, Lecture Notes in Computer Science
, vol.2846
, pp. 265-279
-
-
Choi, J.G.1
Sakurai, K.2
Park, J.H.3
-
2
-
-
33646204415
-
Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting scheme
-
J. J. Fridrich (Ed.) Berlin: Springer
-
Choi, J. G., Park, J. H., & Kwon, K. R. (2004). Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting scheme. In J. J. Fridrich (Ed.), 6th International workshop on information hiding-IH 2004, Lecture Notes in Computer Science (Vol. 3200, pp. 253-265). Berlin: Springer.
-
(2004)
6th International Workshop on Information Hiding-IH 2004, Lecture Notes in Computer Science
, vol.3200
, pp. 253-265
-
-
Choi, J.G.1
Park, J.H.2
Kwon, K.R.3
-
4
-
-
54049122965
-
Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity
-
IEEE computer society, 2008
-
Deng, M., & Preneel, B. (2008a). Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In International symposium on electronic commerce and security, ICECS 2008 (pp. 923-929). IEEE computer society.
-
(2008)
International Symposium on Electronic Commerce and Security, ICECS
, pp. 923-929
-
-
Deng, M.1
Preneel, B.2
-
7
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
20 pp. doi: 10.1155/2007/78943
-
Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R. L., Shokrollahi, J., Neven, G., et al. (2007). Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, 78:943, 20 pp. doi: 10.1155/2007/78943.
-
(2007)
EURASIP Journal on Information Security
, vol.78
, pp. 943
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
-
8
-
-
33645699941
-
A web oriented and interactive buyer-seller watermarking protocol
-
Frattolillo, F., & D'Onofrio, S. (2006). A web oriented and interactive buyer-seller watermarking protocol. In Security, steganography, and watermarking of multimedia content VIII, Proceedings of SPIE (Vol. 6072, pp. 718-716).
-
(2006)
Security, Steganography, and Watermarking of Multimedia Content VIII, Proceedings of SPIE
, vol.6072
, pp. 718-716
-
-
Frattolillo, F.1
D'Onofrio, S.2
-
9
-
-
35048873815
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
-
M. Jakobsson, M. Yung, & J. Zhou (Eds.) Berlin: Springer
-
Goi, B. M., Phan, R. C. W., Yang, Y., Bao, F., Deng, R. H., & Siddiqi, M. U. (2004). Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In M. Jakobsson, M. Yung, & J. Zhou (Eds.), Applied cryptography and network security-ACNS 2004, Lecture Notes in Computer Science (Vol. 3089, pp. 369-382). Berlin: Springer.
-
(2004)
Applied Cryptography and Network Security-ACNS 2004, Lecture Notes in Computer Science
, vol.3089
, pp. 369-382
-
-
Goi, B.M.1
Phan, R.C.W.2
Yang, Y.3
Bao, F.4
Deng, R.H.5
Siddiqi, M.U.6
-
10
-
-
33744914340
-
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
-
T. Enokido, L. Yan, B. Xiao, D. Kim, Y.S. Dai, & L.T. Yang (Eds.) Berlin: Springer
-
Goi, B. M., Phan, R. C. W., & Siddiqi, M. U. (2005). Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y.S. Dai, & L.T. Yang (Eds.), Embedded and ubiquitous computing-EUC 2005, Lecture Notes in Computer Science (Vol. 3823, pp. 936-944). Berlin: Springer.
-
(2005)
Embedded and Ubiquitous Computing-EUC 2005, Lecture Notes in Computer Science
, vol.3823
, pp. 936-944
-
-
Goi, B.M.1
Phan, R.C.W.2
Siddiqi, M.U.3
-
11
-
-
38049063902
-
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
-
O. Gervasi, & M.L. Gavrilova (Eds.) Berlin: Springer
-
Goi, B. M., Phan, R. C. W., & Chuah, H. T. (2007). Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection. In O. Gervasi, & M.L. Gavrilova (Eds.), International conference on computational science and its applications-ICCSA 2007, Lecture Notes in Computer Science (Vol. 4705, pp. 951-960). Berlin: Springer.
-
(2007)
International Conference on Computational Science and Its Applications-ICCSA 2007, Lecture Notes in Computer Science
, vol.4705
, pp. 951-960
-
-
Goi, B.M.1
Phan, R.C.W.2
Chuah, H.T.3
-
14
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
P. J. Lee, & C. H. Lim (Eds.) Berlin: Springer
-
Ju, H. S., Kim, H. J., Lee, D. H., & Lim, J. I. (2002). An anonymous buyer-seller watermarking protocol with anonymity control. In P. J. Lee, & C. H. Lim (Eds.), Information security and cryptology-ICISC 2002, Lecture Notes in Computer Science (Vol. 2587, pp. 421-432). Berlin: Springer.
-
(2002)
Information Security and Cryptology-ICISC 2002, Lecture Notes in Computer Science
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
15
-
-
33646252698
-
Fingerprinting protocol for online-line trade using information gap between buyer and merchant
-
10.1093/ietfec/e89-a.4.1108
-
M. Kuribayashi H. Tanaka 2006 Fingerprinting protocol for online-line trade using information gap between buyer and merchant IEICE Transactions on Fundamentals E89-A 4 1108 1115 10.1093/ietfec/e89-a.4.1108
-
(2006)
IEICE Transactions on Fundamentals
, vol.89
, Issue.4
, pp. 1108-1115
-
-
Kuribayashi, M.1
Tanaka, H.2
-
16
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
10.1109/TIP.2004.837553
-
C. L. Lei P. L. Yu P. L. Tsai M. H. Chan 2004 An efficient and anonymous buyer-seller watermarking protocol IEEE Transactions on Image Processing 13 12 1618 1626 10.1109/TIP.2004.837553
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.L.1
Yu, P.L.2
Tsai, P.L.3
Chan, M.H.4
-
17
-
-
54249120286
-
An anonymous watermarking scheme for content distribution protection using trusted computing
-
INSTICC Press
-
Leung, A., & Poh, G. S. (2007). An anonymous watermarking scheme for content distribution protection using trusted computing. In SECRYPT 2007-International conference on security and cryptography (pp. 319-326). INSTICC Press.
-
(2007)
SECRYPT 2007-International Conference on Security and Cryptography
, pp. 319-326
-
-
Leung, A.1
Poh, G.S.2
-
18
-
-
0035307977
-
A buyer-seller watermarking protocol
-
DOI 10.1109/83.913598, PII S1057714901027300
-
N. Memon P. W. Wong 2001 A buyer-seller watermarking protocol IEEE Transactions on Image Processing 10 4 643 649 1061.68531 10.1109/83.913598 (Pubitemid 32371598)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern (Ed.) Berlin: Springer
-
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In J. Stern (Ed.), Advances in cryptology-EUROCRYPT 1999, Lecture Notes in Computer Science (Vol. 1592, pp. 223-238). Berlin: Springer.
-
(1999)
Advances in Cryptology-EUROCRYPT 1999, Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
78650612915
-
An efficient buyer-seller watermarking scheme based on chameleon encryption
-
H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) Berlin: Springer
-
Poh, G. S., & Martin, K. M. (2008). An efficient buyer-seller watermarking scheme based on chameleon encryption. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.), Digital watermarking, 7th international workshop, IWDW 2008, Lecture Notes in Computer Science. Berlin: Springer.
-
(2008)
Digital Watermarking, 7th International Workshop, IWDW 2008, Lecture Notes in Computer Science
-
-
Poh, G.S.1
Martin, K.M.2
-
22
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
-
10.1006/jvci.1998.0391
-
L. Qiao K. Nahrstedt 1998 Watermarking schemes and protocols for protecting rightful ownerships and customer's rights Journal of Visual Communication and Image Representation 9 3 194 210 10.1006/jvci.1998.0391
-
(1998)
Journal of Visual Communication and Image Representation
, vol.9
, Issue.3
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
23
-
-
56749156833
-
Using a formal technique to identify an unbinding attack on a buyer-seller watermarking protocol
-
ACM
-
Williams, D. M., Treharne, H., Ho, A. T. S., & Culnane, C. (2008). Using a formal technique to identify an unbinding attack on a buyer-seller watermarking protocol. In ACM workshop on multimedia and security, MM&Sec 2008 (pp. 205-214). ACM.
-
(2008)
ACM Workshop on Multimedia and Security, MM&Sec 2008
, pp. 205-214
-
-
Williams, D.M.1
Treharne, H.2
Ho, A.T.S.3
Culnane, C.4
-
24
-
-
38549127334
-
Security flaws in Kuribayashi-Tanaka fingerprinting protocol
-
IEEE
-
Wu, Y. (2007). Security flaws in Kuribayashi-Tanaka fingerprinting protocol. In International conference on communications, ICC 2007 (pp. 1317-1322) IEEE.
-
(2007)
International Conference on Communications, ICC 2007
, pp. 1317-1322
-
-
Wu, Y.1
-
25
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
10.1049/ip-ifs:20055069
-
J. Zhang W. Kou K. Fan 2006 Secure buyer-seller watermarking protocol IEE Proceedings-Information Security 153 1 15 18 10.1049/ip-ifs:20055069
-
(2006)
IEE Proceedings-Information Security
, vol.153
, Issue.1
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
|