-
1
-
-
20744446893
-
Advances in digital video content protection
-
10.1109/JPROC.2004.839623
-
Lin, E. T., Eskicioglu, A. M., & Lagendijk, R. L. (2005). Advances in digital video content protection. Proceedings of the IEEE, 93(1), 171-183.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.1
, pp. 171-183
-
-
Lin, E.T.1
Eskicioglu, A.M.2
Lagendijk, R.L.3
-
2
-
-
77955305045
-
Requirements for enforcing digital rights management in multicast content distribution
-
10.1007/s11235-009-9231-4
-
Barhoush, M., & William Atwood, J. (2010). Requirements for enforcing digital rights management in multicast content distribution. Telecommunications Systems, 45(1), 3-20.
-
(2010)
Telecommunications Systems
, vol.45
, Issue.1
, pp. 3-20
-
-
Barhoush, M.1
William Atwood, J.2
-
3
-
-
0034249821
-
Partial encryption of compressed images and videos
-
10.1109/78.852023
-
Cheng, H., & Li, X. B. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439-2451.
-
(2000)
IEEE Transactions on Signal Processing
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.B.2
-
4
-
-
16344371432
-
Security analysis of a chaos-based image encryption algorithm
-
10.1016/j.physa.2005.01.001
-
Lian, S. G., Sun, J. S., & Wang, Z. Q. (2005). Security analysis of a chaos-based image encryption algorithm. Physica A, 351(2-4), 645-661.
-
(2005)
Physica A
, vol.351
, Issue.2-4
, pp. 645-661
-
-
Lian, S.G.1
Sun, J.S.2
Wang, Z.Q.3
-
5
-
-
77954887026
-
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems
-
10.1007/s11235-009-9264-8
-
Lee, D. G., Kim, J., Sung, J., et al. (2010). Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommunications Systems, 45(3-4), 267-279.
-
(2010)
Telecommunications Systems
, vol.45
, Issue.3-4
, pp. 267-279
-
-
Lee, D.G.1
Kim, J.2
Sung, J.3
-
6
-
-
77955920069
-
A new chaos-based fast image encryption algorithm
-
10.1016/j.asoc.2009.12.011
-
Wang, Y., Wong, K. W., Liao, X. F., et al. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514-522.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.1
, pp. 514-522
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.F.3
-
7
-
-
67349203285
-
On the security defects of an image encryption scheme
-
10.1016/j.imavis.2008.12.008
-
Li, C. Q., Li, S. J., Asim, M., et al. (2009). On the security defects of an image encryption scheme. Image and Vision Computing, 27(9), 1371-1381.
-
(2009)
Image and Vision Computing
, vol.27
, Issue.9
, pp. 1371-1381
-
-
Li, C.Q.1
Li, S.J.2
Asim, M.3
-
8
-
-
63649106070
-
A symmetric image encryption scheme based on a simple novel two-dimensional map
-
Huang, F., Feng, Y., & Yu, X. H. (2007). A symmetric image encryption scheme based on a simple novel two-dimensional map. International Journal of Innovative Computing, Information & Control, 3(6B), 1593-1602.
-
(2007)
International Journal of Innovative Computing, Information & Control
, vol.3
, Issue.6 B
, pp. 1593-1602
-
-
Huang, F.1
Feng, Y.2
Yu, X.H.3
-
9
-
-
0037372152
-
Content-based image copy detection
-
10.1016/S0923-5965(02)00130-3
-
Kim, C. (2003). Content-based image copy detection. Signal Processing. Image Communication, 18(3), 169-184.
-
(2003)
Signal Processing. Image Communication
, vol.18
, Issue.3
, pp. 169-184
-
-
Kim, C.1
-
10
-
-
34248561901
-
Novel image copy detection with rotating tolerance
-
10.1016/j.jss.2006.12.001
-
Wub, M.-N., Linc, C.-C., & Chen, C. (2007). Novel image copy detection with rotating tolerance. The Journal of Systems and Software, 80(7), 1057-1069.
-
(2007)
The Journal of Systems and Software
, vol.80
, Issue.7
, pp. 1057-1069
-
-
Wub, M.-N.1
Linc, C.-C.2
Chen, C.3
-
11
-
-
77952256823
-
An image-based approach to video copy detection with spatio-temporal post-filtering
-
10.1109/TMM.2010.2046265
-
Douze, M., Jegou, H., & Schmid, C. (2010). An image-based approach to video copy detection with spatio-temporal post-filtering. IEEE Transactions on Multimedia, 12(4), 257-266.
-
(2010)
IEEE Transactions on Multimedia
, vol.12
, Issue.4
, pp. 257-266
-
-
Douze, M.1
Jegou, H.2
Schmid, C.3
-
12
-
-
79953029487
-
A novel image copy detection scheme based on the local multi-resolution histogram descriptor
-
10.1007/s11042-009-0438-x
-
Xu, Z., Ling, H., Zou, F., et al. (2011). A novel image copy detection scheme based on the local multi-resolution histogram descriptor. Multimedia Tools and Applications, 52(2), 445-463.
-
(2011)
Multimedia Tools and Applications
, vol.52
, Issue.2
, pp. 445-463
-
-
Xu, Z.1
Ling, H.2
Zou, F.3
-
13
-
-
79953029604
-
Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching
-
10.1007/s11042-009-0439-9
-
Ling, H., Wang, L., Zou, F., et al. (2011). Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching. Multimedia Tools and Applications, 52(2), 551-568.
-
(2011)
Multimedia Tools and Applications
, vol.52
, Issue.2
, pp. 551-568
-
-
Ling, H.1
Wang, L.2
Zou, F.3
-
14
-
-
0032045557
-
Ordinal measures for image correspondence
-
10.1109/34.677275
-
Bhat, D. N., & Nayar, S. K. (1998). Ordinal measures for image correspondence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(4), 415-423.
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.4
, pp. 415-423
-
-
Bhat, D.N.1
Nayar, S.K.2
-
15
-
-
34547747797
-
A new approach to image copy detection based on extended feature sets
-
10.1109/TIP.2007.900099
-
Hsiao, J. H., Chen, C. S., Chien, L. F., & Chen, M. S. (2007). A new approach to image copy detection based on extended feature sets. IEEE Transactions on Image Processing, 16(8), 2069-2079.
-
(2007)
IEEE Transactions on Image Processing
, vol.16
, Issue.8
, pp. 2069-2079
-
-
Hsiao, J.H.1
Chen, C.S.2
Chien, L.F.3
Chen, M.S.4
-
16
-
-
0032680807
-
Information hiding - A survey
-
10.1109/5.771065
-
Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding - a survey. Proceedings of the IEEE, 87(7), 1062-1078.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
17
-
-
77956137651
-
Coded fingerprinting based watermarking to resist collusion attacks and trace colluders
-
10.1109/ACE.2010.36
-
Saikia, M., Majumder, S., & Das, T. S. (2010). Coded fingerprinting based watermarking to resist collusion attacks and trace colluders. In International conference on advances in computer engineering (ACE), 2010 (pp. 120-124).
-
(2010)
International Conference on Advances in Computer Engineering (ACE), 2010
, pp. 120-124
-
-
Saikia, M.1
Majumder, S.2
Das, T.S.3
-
18
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
10.1109/83.650120
-
Cox, I. J., Kilian, J., Leighton, F. T., et al. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
-
19
-
-
77954888215
-
Localized affine transform resistant watermarking in region-of-interest
-
10.1007/s11235-009-9260-z
-
Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunications Systems, 45(3-4), 205-220.
-
(2010)
Telecommunications Systems
, vol.45
, Issue.3-4
, pp. 205-220
-
-
Zhang, L.1
Zhou, P.-P.2
-
20
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
10.1109/18.705568
-
Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
21
-
-
44649098085
-
A review on blind detection for image steganography
-
10.1016/j.sigpro.2008.03.016
-
Luo, X. Y., Wang, D. S., Wang, P., et al. (2008). A review on blind detection for image steganography. Signal Processing, 88(9), 2138-2157.
-
(2008)
Signal Processing
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.Y.1
Wang, D.S.2
Wang, P.3
-
22
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
10.1109/TIT.2003.809570
-
Barg, A., Blakley, G., & Kabatiansky, G. (2003). Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory, 49, 852-865.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 852-865
-
-
Barg, A.1
Blakley, G.2
Kabatiansky, G.3
-
23
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
10.1109/18.705568
-
Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44, 1987-1995.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, pp. 1987-1995
-
-
Boneh, D.1
Shaw, J.2
-
24
-
-
33745654095
-
A short random fingerprinting code against a small number of pirates
-
LNCS 3857 Springer Berlin
-
Hagiwara, M., Hanaoka, G., & Imai, H. (2006). A short random fingerprinting code against a small number of pirates. In LNCS: Vol. 3857. Proc. of AAECC 2006 (pp. 193-202). Berlin: Springer.
-
(2006)
Proc. of AAECC 2006
, pp. 193-202
-
-
Hagiwara, M.1
Hanaoka, G.2
Imai, H.3
-
26
-
-
71149086318
-
Analyzing cooperation in iterative social network design
-
Boella, G., van der Torre, L., & Villata, S. (2009). Analyzing cooperation in iterative social network design. Journal of Universal Computer Science, 15(13), 2676-2700.
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.13
, pp. 2676-2700
-
-
Boella, G.1
Van Der Torre, L.2
Villata, S.3
-
27
-
-
70349210234
-
Fairness dynamics in multimedia colluders' social networks
-
10.1109/ICASSP.2009.4959871
-
Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2009). Fairness dynamics in multimedia colluders' social networks. In IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009 (pp. 1465-1468).
-
(2009)
IEEE International Conference on Acoustics, Speech and Signal Processing, 2009. ICASSP 2009
, pp. 1465-1468
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
28
-
-
70450247410
-
Behavior forensics with side information for multimedia fingerprinting social network
-
10.1109/TIFS.2009.2033224
-
Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2009). Behavior forensics with side information for multimedia fingerprinting social network. IEEE Transactions on Information Forensics and Security, 4(4), 911-927.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.4
, pp. 911-927
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
29
-
-
69949124178
-
Fairness dynamics in multimedia colluders' social networks
-
10.1109/ICIP.2008.4712459
-
Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2008). Fairness dynamics in multimedia colluders' social networks. In 15th IEEE international conference on image processing, 2008 (ICIP 2008) (pp. 3132-3135).
-
(2008)
15th IEEE International Conference on Image Processing, 2008 (ICIP 2008)
, pp. 3132-3135
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
30
-
-
85032751193
-
Behavior modeling and forensics for multimedia social networks: A case study in multimedia fingerprinting
-
10.1109/MSP.2008.930648
-
Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2009). Behavior modeling and forensics for multimedia social networks: a case study in multimedia fingerprinting. IEEE Signal Processing Magazine, 26(1), 118-139.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.1
, pp. 118-139
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
31
-
-
77951097727
-
A group testing based deterministic tracing algorithm for a short random fingerprint code
-
1-3
-
Kitagawa, T., Hagiwara, M., Nuida, K., et al. (2008). A group testing based deterministic tracing algorithm for a short random fingerprint code. In International symposium on information theory and its application (Vol. 1-3, pp. 706-710).
-
(2008)
International Symposium on Information Theory and Its Application
, pp. 706-710
-
-
Kitagawa, T.1
Hagiwara, M.2
Nuida, K.3
-
32
-
-
77749289141
-
A performance evaluation of collusion attacks in multimedia fingerprinting
-
10.1109/MINES.2009.17
-
Feng, H., Ling, H., Zou, F., et al. (2009). A performance evaluation of collusion attacks in multimedia fingerprinting. In International conference on multimedia information networking and security, 2009, MINES '09 (pp. 530-534).
-
(2009)
International Conference on Multimedia Information Networking and Security, 2009, MINES '09
, pp. 530-534
-
-
Feng, H.1
Ling, H.2
Zou, F.3
-
33
-
-
33646802307
-
Bounded Gaussian fingerprints and the gradient collusion attack
-
Kirovski, D., & Mihcak, M. K. (2005). Bounded Gaussian fingerprints and the gradient collusion attack. In IEEE international conference on acoustics, speech, and signal processing (pp. 1037-1040).
-
(2005)
IEEE International Conference on Acoustics, Speech, and Signal Processing
, pp. 1037-1040
-
-
Kirovski, D.1
Mihcak, M.K.2
-
34
-
-
69749127977
-
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
-
10.1109/TIFS.2009.2025849
-
Cha, B. H., & Kuo, C. C. J. (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. IEEE Transactions on Information Forensics and Security, 4(3), 302-317.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 302-317
-
-
Cha, B.H.1
Kuo, C.C.J.2
-
36
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
10.1109/TIP.2005.846035
-
Zhao, H. V., Wu, M., Wang, Z. J., et al. (2005). Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Transactions on Image Processing, 14(5), 646-661.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.V.1
Wu, M.2
Wang, Z.J.3
-
37
-
-
22144450367
-
New paradigms for effective multicasting and fingerprinting of entertainment media
-
Luh, W., & Kundur, D. (2005). New paradigms for effective multicasting and fingerprinting of entertainment media. IEEE Communications Magazine, 77(84).
-
(2005)
IEEE Communications Magazine
, vol.77
, Issue.84
-
-
Luh, W.1
Kundur, D.2
-
38
-
-
84985922619
-
Tracing traitors
-
LNCS 839 Springer Berlin
-
Chor, et al. (1994). Tracing traitors. In LNCS: Vol. 839. Advances in cryptology-Crypto'94 (pp. 480-491). Berlin: Springer.
-
(1994)
Advances in cryptology-Crypto'94
, pp. 480-491
-
-
Chor1
-
39
-
-
37649028224
-
Finding and evaluating community structure in networks
-
026113 10.1103/PhysRevE.69.026113
-
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review. E, Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics, 69, 026113.
-
(2004)
Physical Review. E, Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics
, vol.69
-
-
Newman, M.E.J.1
Girvan, M.2
-
40
-
-
77955307807
-
Traitor tracing over YouTube video service-proof of concept
-
10.1007/s11235-009-9236-z
-
Tomas-Buliart, J., Fernandez, M., & Soriano, M. (2010). Traitor tracing over YouTube video service-proof of concept. Telecommunications Systems, 45(1), 47-60.
-
(2010)
Telecommunications Systems
, vol.45
, Issue.1
, pp. 47-60
-
-
Tomas-Buliart, J.1
Fernandez, M.2
Soriano, M.3
-
41
-
-
33746989201
-
Secure advanced video coding based on selective encryption algorithms
-
10.1109/TCE.2006.1649688
-
Lian, S. G., Liu, Z. X., Ren, Z., et al. (2006). Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2), 621-629.
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.52
, Issue.2
, pp. 621-629
-
-
Lian, S.G.1
Liu, Z.X.2
Ren, Z.3
-
42
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
10.1109/TCSVT.2007.896635
-
Lian, S. G., et al. (2007). Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774-778.
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.G.1
-
43
-
-
67349286030
-
Efficient image or video encryption based on spatiotemporal chaos system
-
10.1016/j.chaos.2007.10.054
-
Lian, S. G. (2009). Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals, 40(5), 2509-2519.
-
(2009)
Chaos, Solitons and Fractals
, vol.40
, Issue.5
, pp. 2509-2519
-
-
Lian, S.G.1
-
44
-
-
78149281534
-
Content and service protection for the ubiquitous TV based on network convergence
-
10.1007/s11277-009-9783-3
-
Lian, S. G. (2010). Content and service protection for the ubiquitous TV based on network convergence. Wireless Personal Communications, 55(1), 19-34.
-
(2010)
Wireless Personal Communications
, vol.55
, Issue.1
, pp. 19-34
-
-
Lian, S.G.1
-
45
-
-
55149105649
-
Collusion-traceable secure multimedia distribution based on controllable modulation
-
10.1109/TCSVT.2008.2002829
-
Lian, S. G., & Wang, Z. Q. (2008). Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology, 18(10), 1462-1467.
-
(2008)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.18
, Issue.10
, pp. 1462-1467
-
-
Lian, S.G.1
Wang, Z.Q.2
-
46
-
-
48749117940
-
Secure media content distribution based on the improved set-top box in IPTV
-
10.1109/TCE.2008.4560130
-
Lian, S. G., & Liu, Z. X. (2008). Secure media content distribution based on the improved set-top box in IPTV. IEEE Transactions on Consumer Electronics, 54(2), 560-566.
-
(2008)
IEEE Transactions on Consumer Electronics
, vol.54
, Issue.2
, pp. 560-566
-
-
Lian, S.G.1
Liu, Z.X.2
-
47
-
-
69749117797
-
Secure video distribution scheme based on partial encryption
-
10.1002/ima.20199
-
Lian, S. G. (2009). Secure video distribution scheme based on partial encryption. International Journal of Imaging Systems and Technology, 19(3), 227-235.
-
(2009)
International Journal of Imaging Systems and Technology
, vol.19
, Issue.3
, pp. 227-235
-
-
Lian, S.G.1
-
48
-
-
70350168767
-
Secure image distribution based on joint decryption and fingerprinting
-
10.1179/174313109X373693
-
Lian, S. G. (2009). Secure image distribution based on joint decryption and fingerprinting. Imaging Science Journal, 57(2), 84-93.
-
(2009)
Imaging Science Journal
, vol.57
, Issue.2
, pp. 84-93
-
-
Lian, S.G.1
-
49
-
-
63449123596
-
Quasi-commutative watermarking and encryption for secure media content distribution
-
10.1007/s11042-008-0258-4
-
Lian, S. G. (2009). Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 43(1), 91-107.
-
(2009)
Multimedia Tools and Applications
, vol.43
, Issue.1
, pp. 91-107
-
-
Lian, S.G.1
-
50
-
-
78049458157
-
Bandwidth-effective streaming of educational medical videos
-
10.1007/s00530-010-0183-z
-
Kantarci, A. (2010). Bandwidth-effective streaming of educational medical videos. Multimedia Systems, 16(6), 381-397.
-
(2010)
Multimedia Systems
, vol.16
, Issue.6
, pp. 381-397
-
-
Kantarci, A.1
-
51
-
-
30144437180
-
Fingerprint multicast in secure video streaming
-
10.1109/TIP.2005.860356
-
Zhao, H. V., & Liu, K. J. R. (2006). Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing, 15(1), 12-29.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.1
, pp. 12-29
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
52
-
-
77951203856
-
Detecting community structure in complex networks via node similarity
-
10.1016/j.physa.2010.03.006
-
Pan, Y., Li, D.-H., Liu, J.-G., et al. (2010). Detecting community structure in complex networks via node similarity. Physica. A, 389, 2849-2857.
-
(2010)
Physica. A
, vol.389
, pp. 2849-2857
-
-
Pan, Y.1
Li, D.-H.2
Liu, J.-G.3
-
53
-
-
33744751840
-
The Boneh-Shaw fingerprinting scheme is better than we thought
-
10.1109/TIFS.2006.873596
-
Schaathun, H. G. (2006). The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Transactions on Information Forensics and Security, 1(2), 248-255.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 248-255
-
-
Schaathun, H.G.1
-
54
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
10.1145/1346330.1346335
-
Tardos, G. (2008). Optimal probabilistic fingerprint codes. Journal of the ACM, 55(2), 1-24.
-
(2008)
Journal of the ACM
, vol.55
, Issue.2
, pp. 1-24
-
-
Tardos, G.1
-
55
-
-
48849090055
-
Tardos fingerprinting is better than we thought
-
10.1109/TIT.2008.926307
-
Skoric, B., Vladimirova, T. U., Celik, M., & Talstra, J. C. (2008). Tardos fingerprinting is better than we thought. IEEE Transactions on Information Theory, 54(8), 3663-3676.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.8
, pp. 3663-3676
-
-
Skoric, B.1
Vladimirova, T.U.2
Celik, M.3
Talstra, J.C.4
-
56
-
-
59449103335
-
Detect overlapping and hierarchical community structure in networks
-
10.1016/j.physa.2008.12.021
-
Shen, H., Cheng, X., Cai, K., & Hu, M.-b. (2009). Detect overlapping and hierarchical community structure in networks. Physica. A, 388(8), 1706-1712.
-
(2009)
Physica. A
, vol.388
, Issue.8
, pp. 1706-1712
-
-
Shen, H.1
Cheng, X.2
Cai, K.3
Hu, M.-B.4
|