-
1
-
-
33746365751
-
Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
-
D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, 1991, pp. 75-122.
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
84947942283
-
Fingerprinting Long Forgiving Messages
-
Springer
-
G.R. Blakeley, C. Meadows, G.B. Purdy, Fingerprinting Long Forgiving Messages, Proc. CRYPTO'85, Springer, 1986, pp. 180-189.
-
(1986)
Proc. CRYPTO'85
, pp. 180-189
-
-
Blakeley, G.R.1
Meadows, C.2
Purdy, G.B.3
-
3
-
-
84957670625
-
Collusion-Secure Fingerprinting for Digital Data
-
Springer
-
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Proc. CRYPTO'95, Springer, 1995, pp. 452-465.
-
(1995)
Proc. CRYPTO'95
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0002152920
-
Assuring Ownership Rights for Digital Images
-
Wiesbaden
-
Germano Caronni, Assuring Ownership Rights for Digital Images, Proc. Verläfiliche Informa,tionssysteme'95, Wiesbaden, 1995, pp. 251-263.
-
(1995)
Proc. Verläfiliche Informa,tionssysteme'95
, pp. 251-263
-
-
Caronni, G.1
-
7
-
-
0002859474
-
Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result
-
Springer
-
D. Chaum, I. Damgard, J. van de Graaf, Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result, Proc. CRYPTO'87, Springer, 1988, pp. 88-119.
-
(1988)
Proc. CRYPTO'87
, pp. 88-119
-
-
Chaum, D.1
Damgard, I.2
van de Graaf, J.3
-
8
-
-
84985922619
-
Tracing Traitors
-
Springer
-
Benny Chor, Amos Fiat, Moni Naor, Tracing Traitors, Proc. CRYPTO'94, Springer, 1994, pp. 257-270.
-
(1994)
Proc. CRYPTO'94
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
9
-
-
77952175010
-
Digital Signets: Self-Enforcing Protection of Digital Information
-
C. Dwork, J. Lotspiech, M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, Proc. 28th STOC, 1996.
-
(1996)
Proc. 28th STOC
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
11
-
-
0002337124
-
Towards a Theory of Software Protection and Simulation by Oblivious RAMs
-
O. Goldreich. Towards a Theory of Software Protection and Simulation by Oblivious RAMs, Proc. 19th STOC, 1987, pp. 218-229.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
-
13
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali, C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, Vol. 18, No. 1, 1989, pp. 186-208.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
14
-
-
84944981072
-
An efficient Software Protection Scheme
-
Springer
-
Rafail Ostovsky, An efficient Software Protection Scheme, Proc. CRYPTO'89, Springer, 1990, pp. 610-611.
-
(1990)
Proc. CRYPTO'89
, pp. 610-611
-
-
Ostovsky, R.1
-
15
-
-
0002007986
-
Trials of Traced Traitors (Extended Abstract)
-
Cambridge, UK, Proc. to appear in LNCS, Springer
-
Birgit Pfitzmann, Trials of Traced Traitors (Extended Abstract), Proc. Workshop on Information Hiding, Cambridge, UK, 1996, Proc. to appear in LNCS, Springer.
-
(1996)
Proc. Workshop on Information Hiding
-
-
Pfitzmann, B.1
-
17
-
-
0030704505
-
Asymmetric Fingerprinting for Larger Collusions
-
to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich
-
Birgit Pfitzmann, Michael Waidner, Asymmetric Fingerprinting for Larger Collusions, Proc. of the 4th ACM Conference on Computer and Communications Security, 1997, to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich.
-
(1997)
Proc. of the 4th ACM Conference on Computer and Communications Security
-
-
Pfitzmann, B.1
Waidner, M.2
-
18
-
-
0023568495
-
Random Self-Reducïbility and Zero-Knowledge Interactive Proofs of Possession of Information
-
M. Tompa, H. Woll, Random Self-Reducïbility and Zero-Knowledge Interactive Proofs of Possession of Information, Proc. 28th FOCS, 1987, pp. 472-482.
-
(1987)
Proc. 28th FOCS
, pp. 472-482
-
-
Tompa, M.1
Woll, H.2
|