-
2
-
-
84947916599
-
-
I. Biehl and B. Meyer. Protocols for collusion-secure asymmetric fingerprinting. In STACS 97, Lecture Notes in Computer Science, vol. 1200, pages 399–412, Berlin, 1997.S pringer-Verlag. 135
-
(1997)
Protocols for Collusion-Secure Asymmetric Fingerprinting. In STACS 97, Lecture Notes In Computer Science
, vol.1200
, Issue.135
, pp. 399-412
-
-
Biehl, I.1
Meyer, B.2
-
3
-
-
84947942283
-
Fingerprinting long forgiving messages. I n CRYPTO’85, Lecture Notes in Computer Science
-
G.R.Blak ley, C.Mead ows, and G.B. Purdy. Fingerprinting long forgiving messages. I n CRYPTO’85, Lecture Notes in Computer Science, vol. 218, pages 180–189, Berlin, 1986.S pringer-Verlag. 135, 137
-
(1986)
S Pringer-Verlag
, vol.218
, Issue.135-137
, pp. 180-189
-
-
Ley, G.1
Ows, C.M.2
-
4
-
-
84957670625
-
Collusion-secure fingerprinting for digital data.In CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pages 452–465, Berlin
-
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data.In CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pages 452–465, Berlin, 1995. Springer-Verlag. 135, 137, 138, 140, 142, 143, 144
-
(1995)
Springer-Verlag. 135, 137, 138, 140
, vol.142
, Issue.143
, pp. 144
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
84985922619
-
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In CRYPTO’94, Lecture Notes in Computer Science, vol. 839, pages 257–270, Berlin, 1994.S pringer-Verlag. 144
-
(1994)
Tracing Traitors. In CRYPTO’94, Lecture Notes In Computer Science, Vol. 839, Pages
, vol.144
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
84948001148
-
-
Turan-type problems in group testing, coding theory and cryptography. Ph.d.t hesis, Waterloo, Canada
-
Y. M. Chee. Turan-type problems in group testing, coding theory and cryptography. Ph.d.t hesis, University of Waterloo, Waterloo, Canada, 1996. 137
-
(1996)
University of Waterloo
, pp. 137
-
-
Chee, Y.M.1
-
8
-
-
84947937393
-
-
I. Cox, J.K ilian, F.T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia.I n Information hiding: first international workshop, Lecture Notes in Computer Science, vol. 1174, pages 185–208, Berlin, 1996.S pringer-Verlag. 135
-
(1996)
A Secure, Robust Watermark for Multimedia.I N Information Hiding: First International Workshop, Lecture Notes in Computer Science
, vol.1174
, Issue.135
, pp. 185-208
-
-
Cox, I.1
Ilian, J.K.2
Leighton, F.T.3
Shamoon, T.4
-
9
-
-
84957610906
-
-
A
-
F. Ergun, J. Kilian, and R. Kumar. A Note on the Limits of Collusion-Resistant Watermarks.I n EUROCRYPT’99, Lecture Notes in Computer Science, vol. 1592, pages 140–149, Berlin, 1999.Springer-Verlag. 135
-
(1999)
Note on the Limits of Collusion-Resistant Watermarks.I N EUROCRYPT’99, Lecture Notes in Computer Science
, vol.1592
, Issue.135
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
10
-
-
0037796443
-
-
Department of Computer Science, Princeton University
-
J. Kilian, T. Leighton, L. R. Matheson, T.G. Shamoon, R. E. Tarjan, and F. Zane. Resistance of digital watermarks to collusive attacks. Technical report TR-585-98, Department of Computer Science, Princeton University, 1998. 135
-
(1998)
Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98
, pp. 135
-
-
Kilian, J.1
Leighton, T.2
Matheson, L.R.3
Shamoon, T.G.4
Tarjan, R.E.5
Zane, F.6
-
11
-
-
84947925055
-
-
L. R. Matheson, S.G. Mitchell, T.G. Shamoon, R. E. Tarjan, and F. Zane. Robustness and security of digital watermarks.In 2nd International Conference on Financial Cryptography, Lecture Notes in Computer Science, vol. 1465, pages 227–240, Berlin, 1998.S pringer-Verlag. 136
-
(1998)
Robustness and Security of Digital Watermarks.In 2Nd International Conference on Financial Cryptography, Lecture Notes in Computer Science
, vol.1465
, Issue.136
, pp. 227-240
-
-
Matheson, L.R.1
Mitchell, S.G.2
Shamoon, T.G.3
Tarjan, R.E.4
Zane, F.5
-
12
-
-
84957877979
-
-
F.A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems.I n Information Hiding: 2nd international workshop, Lecture Notes in Computer Science, vol.1525, pages 218–238, Berlin, 1998.S pringer-Verlag. 136
-
(1998)
Attacks on Copyright Marking Systems.I N Information Hiding: 2Nd International Workshop, Lecture Notes in Computer Science
, vol.1525
, Issue.136
, pp. 218-238
-
-
Petitcolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
13
-
-
84947921515
-
-
B. Pfitzmann and M. Schunter. Asymmetric fingerprinting. In EUROCRYPT’96, Lecture Notes in Computer Science, vol. 1070, pages 84–95, Berlin, 1996.S pringer-Verlag. 135
-
(1996)
Asymmetric Fingerprinting. In EUROCRYPT’96, Lecture Notes In Computer Science
, vol.1070
, Issue.135
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
15
-
-
84947930749
-
-
D.R. Stinson, T. van Trung, and R. Wei. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures.Submi tted to Journal of Statistical Planning and Inference, version from http://cacr.math.uwaterloo.ca/∼dstinson/index.html#pubs, November 1997. 137
-
(1997)
Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures.Submi Tted to Journal of Statistical Planning and Inference
, pp. 137
-
-
Stinson, D.R.1
Van Trung, T.2
Wei, R.3
|