The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Buyer-Seller Watermarking Protocols with Off-line Trusted Parties
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
An Effective and Secure Buyer-Seller Watermarking Protocol
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Proceedings of the 10th ACM workshop on Multimedia and security
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Formal Analysis of Two Buyer-Seller Watermarking Protocols
Digital Watermarking
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption
Digital Watermarking
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Fair content tracing (FaCT) protocols have been proposed by many authors to allow content tracing based on digital watermarking to be performed in a manner that does not discriminate either the client who downloads content or the distributor who provides content. We propose a general design framework for fair content tracing (FaCT) protocols. This framework provides a means to address the ad hoc design issues arising for many existing protocols, several of which have been broken through poor design. We then classify existing FaCT protocols based on this framework, which allows for a more systematic approach to FaCT protocol analysis. We further provide general comparisons and evaluation criteria for FaCT protocols.