메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 219-226

Database authentication by distortion free watermarking

Author keywords

Abstract interpretation; Database watermarking; Public key watermark; ZAW

Indexed keywords

ABSTRACT INTERPRETATIONS; ABSTRACT REPRESENTATION; AUTHENTICATION MECHANISMS; CONCRETE DOMAINS; DATABASE WATERMARKING; GRAY-SCALE IMAGES; PUBLIC KEYS; RELATIONAL DATABASE; TAMPER DETECTION; VIRTUAL GROUPING; WATERMARKING TECHNIQUES; ZAW;

EID: 78751515268     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 0041513205 scopus 로고    scopus 로고
    • Water-marking relational data: Framework, algorithms and analysis
    • Agrawal, R., Haas, P. J., and Kiernan, J. (2003). Water-marking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2):157-169.
    • (2003) The VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 2
    • 71549132338 scopus 로고    scopus 로고
    • A distortion free watermark framework for relational databases
    • Bhattacharya, S. and Cortesi, A. (2009a). A distortion free watermark framework for relational databases. In IC-SOFT(2), pages 229-234.
    • (2009) IC-SOFT , Issue.2 , pp. 229-234
    • Bhattacharya, S.1    Cortesi, A.2
  • 3
    • 71549145624 scopus 로고    scopus 로고
    • A generic distortion free watermarking technique for relational databases
    • Bhattacharya, S. and Cortesi, A. (2009b). A generic distortion free watermarking technique for relational databases. In ICISS, pages 252-264.
    • (2009) ICISS , pp. 252-264
    • Bhattacharya, S.1    Cortesi, A.2
  • 4
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • Collberg, C. S. and Thomborson, C. (2002). Watermarking, tamper-proofing, and obfuscation - tools for software protection. Software Engineering, IEEE Transactions on, 28:735-746.
    • (2002) Software Engineering, IEEE Transactions on , vol.28 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 5
    • 0042746404 scopus 로고    scopus 로고
    • Abstract interpretation based formal methods and future challenges
    • Springer-Verlag
    • Cousot, P. (2001). Abstract interpretation based formal methods and future challenges. In Informatics -10 Years Back. 10 Years Ahead., pages 138-156. Springer-Verlag.
    • (2001) Informatics -10 Years Back. 10 Years Ahead. , pp. 138-156
    • Cousot, P.1
  • 13
    • 0013091373 scopus 로고    scopus 로고
    • HMAC, Federal Information Process Standards Publication
    • HMAC (2002). The keyed-hash message authentication code. Federal Information Process Standards Publication.
    • (2002) The Keyed-hash Message Authentication Code
  • 15
    • 0035975708 scopus 로고    scopus 로고
    • Ranking and unranking permutations in linear time
    • Myrvold, W. and Ruskey, F. (2000). Ranking and unranking permutations in linear time. Information Processing Letters, 79:281-284.
    • (2000) Information Processing Letters , vol.79 , pp. 281-284
    • Myrvold, W.1    Ruskey, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.