-
1
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Springer-Verlag
-
R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices", in Security protocols: International Workshop'97, LNCS 1361, Springer-Verlag, pp.125-136, 1997.
-
(1997)
Security protocols: International Workshop'97, LNCS 1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
2
-
-
0040320732
-
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
-
Pads, April, 1997, LNCS, Springer-Verlag
-
F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, T. Nagir, "Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults", The Second Workshop on Secure Protocols, Pads, April, 1997, LNCS, Springer-Verlag, 1997.
-
(1997)
The Second Workshop on Secure Protocols
-
-
Bao, F.1
Deng, R.2
Han, Y.3
Jeng, A.4
Narasimhalu, D.5
Nagir, T.6
-
3
-
-
0006238967
-
Copyright protection through watermarking: towards tracing illegal Users
-
4.-6. November 1998, Melbourne, Australia
-
F. Bao, Q. Sun, J. Hu, R.H. Deng, J. Wu, "Copyright protection through watermarking: towards tracing illegal Users", The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98), 4.-6. November 1998, Melbourne, Australia, 1998.
-
(1998)
The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98)
-
-
Bao, F.1
Sun, Q.2
Hu, J.3
Deng, R.H.4
Wu, J.5
-
4
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Springer-Verlag
-
D. Boneh, R. DeMillo, and R. Lipton. "On the importance of checking cryptographic protocols for faults", in Proceedings of Eurocrypt '97, LNCS 1233, Springer-Verlag, pp. 37-51, 1997.
-
(1997)
Proceedings of Eurocrypt '97, LNCS 1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
6
-
-
0004166728
-
Can invisible watermarks resolve rightful ownership
-
July 25
-
S. Craver, N. Memon, B. Yeo, M. Yeung, "Can invisible watermarks resolve rightful ownership", IBM Research Report, RC 20509, July 25, 1996.
-
(1996)
IBM Research Report
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, M.4
-
7
-
-
84905823671
-
Protecting VoD the Easier Way
-
Bristol, UK
-
C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, "Protecting VoD the Easier Way", ACM Multimedia '98, pp. 21-28, Bristol, UK, 1998.
-
(1998)
ACM Multimedia '98
, pp. 21-28
-
-
Griwodz, C.1
Merkel, O.2
Dittmann, J.3
Steinmetz, R.4
-
8
-
-
0033203862
-
The convergence of PCs and TV
-
October/December
-
R. Jain, "The convergence of PCs and TV", IEEE Multimedia, October/December 1999.
-
(1999)
IEEE Multimedia
-
-
Jain, R.1
-
9
-
-
85134073436
-
-
P. Kocher, http://www.cryptography.com/resources/
-
-
-
Kocher, P.1
-
10
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
B.M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting", Proceedings of the IEEE, Vol. 83, No, 6, pp. 944-957, 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
11
-
-
0029424437
-
Performance study of a selective Encryption scheme for security of networked, real-time video
-
Las Vegas, Nevada, Sept
-
T. Maples and G. Spanos, "Performance study of a selective Encryption scheme for security of networked, real-time video", Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995.
-
(1995)
Proc. of the 4th International Conference on Computer and Communications and Networks
-
-
Maples, T.1
Spanos, G.2
-
12
-
-
84947921515
-
Asymmetric fingerprinting
-
Springer-Verlag
-
B. Pfitzmann and M. Shunter, "Asymmetric fingerprinting", Eurocrypt'96, LNCS 1070, pp. 84-95, Springer-Verlag, 1996.
-
(1996)
Eurocrypt'96, LNCS 1070
, pp. 84-95
-
-
Pfitzmann, B.1
Shunter, M.2
-
13
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
Springer-Verlag
-
B. Pfitzmann and A. Sadeghi, "Coin-based anonymous fingerprinting", Eurocrypt'99, pp. 150-164, Springer-Verlag, 1999.
-
(1999)
Eurocrypt'99
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.2
-
16
-
-
0030419062
-
Methods for Encrypting and decrypting MPEG video data efficiently
-
Boston, MA, November
-
L. Tang, "Methods for Encrypting and decrypting MPEG video data efficiently", Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.
-
(1996)
Proc. of the 4th ACM Multimedia Conference
-
-
Tang, L.1
-
17
-
-
0001320242
-
Embedding robust label into images for copyright protection
-
Austria, Aug
-
J. Zhao and E. Koch, "Embedding robust label into images for copyright protection", Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21-25, 1995.
-
(1995)
Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies
, pp. 21-25
-
-
Zhao, J.1
Koch, E.2
|