Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Efficient dynamic traitor tracing
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Characteristics of Some Binary Codes for Fingerprinting
ISW '00 Proceedings of the Third International Workshop on Information Security
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Best security index for digital fingerprinting
IH'05 Proceedings of the 7th international conference on Information Hiding
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Worst-case optimal fingerprinting codes for non-threshold collusion
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |