Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Watermarking maps: hiding information in structured data
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
Future mulitmedia databases and research directions
Distributed multimedia databases
WHIM: watermarking multicast video with a hierarchy of intermediaries
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Combinatorial Approach to Asymmetric Traitor Tracing
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Self Protecting Pirates and Black-Box Traitor Tracing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Automatic Detection of a Watermarked Document Using a Private Key
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
Designs, Codes and Cryptography
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Proceedings of the 17th ACM conference on Computer and communications security
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Designs, Codes and Cryptography
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Practical pay-TV scheme using traitor tracing scheme for multiple channels
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |