메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 84-95

Asymmetric fingerprinting

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY;

EID: 84947921515     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_8     Document Type: Conference Paper
Times cited : (165)

References (19)
  • 2
    • 33746365751 scopus 로고
    • Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority
    • [B91]
    • [B91] Donald Beaver: Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority,Journal of Cryptology 4/2 (1991) 75-122.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 4
    • 0028592391 scopus 로고
    • Electronic Marking and Identification Techniques to Discourage Document Copying;
    • Toronto, June 12-16, [BLM94]
    • [BLM94] J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman: Electronic Marking and Identification Techniques to Discourage Document Copying; Proceedings IEEE INFOCOM 94, Toronto, June 12-16, 1994, 1278-1287.
    • (1994) Proceedings IEEE INFOCOM 94 , pp. 1278-1287
    • Brassil, J.1    Low, S.2    Maxemchuk, N.3    O'Gorman, L.4
  • 7
    • 0002152920 scopus 로고
    • Assuring Ownership Rights for Digital Images;
    • Vieweg, Wiesbaden, [C95]
    • [C95] Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS'95; Vieweg, Wiesbaden 1995, 251-263.
    • (1995) Proceedings VIS'95; , pp. 251-263
    • Caronni, G.1
  • 8
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result;
    • LNCS 293, Springer-Verlag, Berlin, [CDG88]
    • [CDG88] David Chaum, Ivan B. Damgård, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party's input and correctness of the result; Crypto'87, LNCS 293, Springer-Verlag, Berlin 1988, 87-119.
    • (1988) Crypto'87 , pp. 87-119
    • Chaum, D.1    Damgård, I.B.2    van de Graaf, J.3
  • 9
    • 0022188127 scopus 로고
    • A robust and verifiable cryptographically secure election scheme;
    • [CF85]
    • [CF85] Josh D. Cohen, Michael J. Fischer: A robust and verifiable cryptographically secure election scheme; 26th FOCS, 1985, 372-382.
    • (1985) 26th FOCS , pp. 372-382
    • Cohen, J.D.1    Fischer, M.J.2
  • 10
    • 84985922619 scopus 로고
    • Tracing traitors
    • LNCS 839, Springer-Verlag, Berlin, [CFN94]
    • [CFN94] Benny Chor, Amos Fiat, Moni Naor: Tracing traitors',Crypto'94, LNCS 839, Springer-Verlag, Berlin 1994, 257-270.
    • (1994) Crypto'94 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 11
    • 0029308984 scopus 로고
    • Copyright Protection for Electronic Publishing Over Computer Networks;
    • [CMP95]
    • [CMP95] Abhijit K. Choudhury, Nicholas F. Maxemchuk, Sanjoy Paul, Henning G. Schulzrinne: Copyright Protection for Electronic Publishing Over Computer Networks;IEEE Network 9/3 (1995) 12-20.
    • (1995) IEEE Network , vol.9 , Issue.3 , pp. 12-20
    • Choudhury, A.K.1    Maxemchuk, N.F.2    Paul, S.3    Schulzrinne, H.G.4
  • 12
    • 0023547498 scopus 로고
    • Towards a Theory of Software Protection and Simulation by Oblivious RAMs;
    • [G87]
    • [G87] Oded Goldreich: Towards a Theory of Software Protection and Simulation by Oblivious RAMs;19th STOC, 1987, 182-194.
    • (1987) 19th STOC , pp. 182-194
    • Goldreich, O.1
  • 13
    • 0023545076 scopus 로고
    • How to play any mental game - or - A completeness theorem for protocols with honest majority;
    • [GMW87]
    • [GMW87] Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game - or - a completeness theorem for protocols with honest majority;19th STOC, 1987, 218-229.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 85028761718 scopus 로고
    • A simple and secure way to show the validity of your public key;
    • LNCS 293, Springer-Verlag, Berlin, [GP88]
    • [GP88] Jeroen van de Graaf, René Peralta: A simple and secure way to show the validity of your public key;Crypto'87, LNCS 293, Springer-Verlag, Berlin 1988, 128-134.
    • (1988) Crypto'87 , pp. 128-134
    • van de Graaf, J.1    Peralta, R.2
  • 15
    • 84936892450 scopus 로고
    • Cryptology for Digital TV Broadcasting;
    • [MQ95]
    • [MQ95] Benoit M. Macq, Jean-Jacques Quisquater: Cryptology for Digital TV Broadcasting;Proceedings of the IEEE 83/6 (1995) 944-957.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.M.1    Quisquater, J.-J.2
  • 16
    • 0345711996 scopus 로고    scopus 로고
    • Laboratory for Computer Science, MIT; distributed at Crypto'91. [MR91]
    • [MR91] Silvio Micali, Phillip Rogaway: Secure Computation (Chapters 1-3);Laboratory for Computer Science, MIT; distributed at Crypto'91.
    • Secure Computation (Chapters 1-3)
    • Micali, S.1    Rogaway, P.2
  • 17
    • 84944981072 scopus 로고
    • An efficient software protection scheme;
    • LNCS 435, Springer-Verlag, Heidelberg, [090]
    • [090] Rafail Ostrovsky: An efficient software protection scheme;Crypto'89, LNCS 435, Springer-Verlag, Heidelberg 1990, 610-611.
    • (1990) Crypto'89 , pp. 610-611
    • Ostrovsky, R.1
  • 19
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets;
    • [Y86]
    • [Y86] Andrew Chi-Chih Yao: How to Generate and Exchange Secrets;27th FOCS, 1986, 162-167.
    • (1986) 27th FOCS , pp. 162-167
    • Chi-Chih, A.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.