|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 16 keywords
|
|
|
Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings, pp. 305-323, 2008, Springer, 978-3-540-68854-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
87 | Wei-jie Yu, Jun Zhang 0003 |
Pheromone-distribution-based adaptive ant colony system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, pp. 31-38, 2010, ACM, 978-1-4503-0072-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
adaptive parameters control, ant colony optimization, travelling salesman problem, ant colony system |
57 | Jiayuan Sui, Douglas R. Stinson |
A Critical Analysis and Improvement of AACS Drive-Host Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 37-52, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Nelly Fazio, Dulce B. Ponceleon |
Tutorial on content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008, pp. 1153-1154, 2008, ACM, 978-1-60558-303-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
4c, aacs, blu-ray disc, broadcast encryption, traitor tracing |
44 | Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang |
Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1531-1534, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 448-465, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi |
A Secure Anonymous Authorisation Architecture for E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 106-111, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 66(3), March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Mmachi God'sglory Obiorah, Anne Marie Piper, Michael S. Horn |
Designing AACs for People with Aphasia Dining in Restaurants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: CHI '21: CHI Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021, pp. 496:1-496:14, 2021, ACM, 978-1-4503-8096-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Zhenghao Xin, Liang Liu 0006, Gerhard P. Hancke 0002 |
AACS: Attribute-Based Access Control Mechanism for Smart Locks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 12(6), pp. 1050, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang |
AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 23(3), pp. 179-193, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Bin B. Zhu, Min Feng 0002, Fen Liu, Lei Hu |
Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 5th IEEE Consumer Communications and Networking Conference, CCNC 2008, Las Vegas, NV, USA, January 10-12, 2008, pp. 1097-1101, 2008, IEEE, 978-1-4244-1456-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jiayuan Sui, Douglas R. Stinson |
A Critical Analysis and Improvement of AACS Drive-Host Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 420, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
31 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 12, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
22 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 253-271, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo |
Efficient Coalition Detection in Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 365-380, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Yongxin Zhou 0002, Alec Main, Yuan Xiang Gu, Harold Johnson |
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 61-75, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin, Jeffery Lotspiech |
Hybrid Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1329-1332, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sheng Mei Shen |
Intellectual Property Management & Protection and Digital Right Management in MPEG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIVR ![In: Image and Video Retrieval, 4th International Conference, CIVR 2005, Singapore, July 20-22, 2005, Proceedings, pp. 59, 2005, Springer, 3-540-27858-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #19 of 19 (100 per page; Change: )
|
|