Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Ehsan Amiri, Gábor Tardos |
High rate fingerprinting codes and the fingerprinting capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 336-345, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
96 | Myungsun Kim, Jongseong Kim, Kwangjo Kim |
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 97-108, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric and symmetric fingerprinting, Bilinear Diffie-Hellman problem, Security reduction, Anonymous, Intellectual property protection |
86 | Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano |
New Considerations about the Correct Design of Turbo Fingerprinting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 501-516, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collusion security, tracing traitor, turbo code, digital fingerprinting |
85 | Shan He 0002, Min Wu 0001 |
Building efficient and effective multimedia fingerprints via joint coding and embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 127-136, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multimedia fingerprinting, error correcting code, collusion resistance |
83 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 45-54, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
80 | N. Prasanth Anthapadmanabhan, Alexander Barg, Ilya Dumer |
On the Fingerprinting Capacity Under the Marking Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2678-2689, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng, Stefanus Mantik, Miodrag Potkonjak, Gang Qu 0001, Jennifer L. Wong |
Effective iterative techniques for fingerprinting design IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(2), pp. 208-215, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
80 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Coin-Based Anonymous Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 150-164, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
80 | Birgit Pfitzmann, Michael Waidner |
Anonymous Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 88-102, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
76 | Ahmad-Reza Sadeghi |
How to Break a Semi-anonymous Fingerprinting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 384-394, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Fingerprinting, Copyright Protection, Oblivious Transfer |
70 | Shan He 0002, Min Wu 0001 |
Performance Study on Multimedia Fingerprinting Employing Traceability Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 84-96, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Won-gyum Kim, Young-Ho Suh |
Short n-secure fingerprinting code for image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 2167-2170, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Shan He 0002, Min Wu 0001 |
Joint coding and embedding techniques for MultimediaFingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 231-247, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Mikkel Baun Kjærgaard, Carsten Valdemar Munk |
Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength (concise contribution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 110-116, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Location Fingerprinting, Signal Strength Differences, IEEE 802.11, Signal Strength |
66 | Humberto J. Abdelnur, Radu State, Olivier Festor |
Advanced Network Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 372-389, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Passive Fingerprinting, Structural syntax inference, Feature extraction |
66 | Yan Zhu 0010, Wei Zou, Xinshan Zhu |
Collusion secure convolutional fingerprinting information codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 266-274, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collusion security, tracing traitor, convolutional code, digital fingerprinting |
66 | Yan Zhu 0010, Dengguo Feng, Wei Zou |
Collusion Secure Convolutional Spread Spectrum Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 67-83, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Collusion secure, Convolutional code, Spread spectrum, Digital fingerprinting |
66 | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano |
Practical Asymmetric Fingerprinting with a TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 352-356, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
asymmetric fingerprinting, Copyright protection, trusted third party |
66 | Gérard D. Cohen, Simon Litsyn, Gilles Zémor |
Binary Codes for Collusion-Secure Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 178-185, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Collusion-resistant code, intersecting code, B2-sequence, watermarking, Fingerprinting |
66 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 401-414, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
66 | Josep Domingo-Ferrer |
Anonymous Fingerprinting Based on Committed Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 43-52, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Anonymous fingerprinting, Committed oblivious transfer, Intellectual property protection, Secure electronic commerce |
61 | Jae-Gwi Choi, Ji-Hwan Park, Ki-Ryong Kwon |
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 253-265, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant Video Fingerprinting for Large User Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(4), pp. 697-709, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend |
Dynamic graph-based software fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 29(6), pp. 35, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
watermarking, software protection, Software piracy |
60 | Sabu Emmanuel, Mohan S. Kankanhalli |
Mask-based fingerprinting scheme for digital video broadcasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 31(2), pp. 145-170, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Video security, Video on demand, Digital watermarks, Copyright protection, MPEG-2, Video watermarking, Pay TV, Digital video broadcasting |
60 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant video Fingerprinting for Large User Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2301-2304, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Pedro Cano, Eloi Batlle, Emilia Gómez, Leandro de C. T. Gomes, Madeleine Bonnet |
Audio Fingerprinting: Concepts And Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence for Modelling and Prediction ![In: Computational Intelligence for Modelling and Prediction, pp. 233-245, 2005, Springer, 978-3-540-26071-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Jared C. Smolens, Brian T. Gold, Jangwoo Kim, Babak Falsafi, James C. Hoe, Andreas Nowatzyk |
Fingerprinting: bounding soft-error detection latency and bandwidth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2004, Boston, MA, USA, October 7-13, 2004, pp. 224-234, 2004, ACM, 1-58113-804-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
dual modular redundancy (DMR), error detection, soft errors, backwards error recovery (BER) |
60 | Jan Camenisch |
Efficient Anonymous Fingerprinting with Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 415-428, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
56 | Ozan Gursoy, Bilge Günsel, Neslihan Serap Sengör |
Transform Invariant Video Fingerprinting by NMF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAIP ![In: Computer Analysis of Images and Patterns, 13th International Conference, CAIP 2009, Münster, Germany, September 2-4, 2009. Proceedings, pp. 452-459, 2009, Springer, 978-3-642-03766-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Video fingerprinting, transformation invariance, non-negative matrix factorization |
56 | Hans Georg Schaathun |
On error-correcting fingerprinting codes for use with watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 13(5-6), pp. 331-344, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Collusion-secure fingerprinting, Watermarking, Error-correcting codes, Copyright protection, Soft-decision decoding |
56 | Julien Lafaye, David Gross-Amblard, Camélia Constantin, Meryem Guerrouani |
Watermill: An Optimized Fingerprinting System for Databases under Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(4), pp. 532-546, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
database watermarking, database fingerprinting, optimization, Security and Privacy Protection |
56 | Fuchun Xie, Teddy Furon, Caroline Fontaine |
On-off keying modulation and tardos fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 101-106, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-collusion, watermarking, fingerprinting |
56 | Hans Georg Schaathun |
On Watermarking/Fingerprinting for Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 50-53, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collusion-secure fingerprinting, watermarking, error-correcting codes, copyright protection, soft-decision decoding |
56 | Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma |
A Review of Audio Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 41(3), pp. 271-284, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
content-based audio identification, audio information retrieval, watermarking, integrity verification, audio fingerprinting, robust hashing |
56 | Camélia Constantin, David Gross-Amblard, Meryem Guerrouani |
Watermill: an optimized fingerprinting system for highly constrained data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 143-155, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
semantic integrity constraints, usability constraints, XML, relational databases, watermarking, fingerprinting |
56 | Daniel Schonberg, Darko Kirovski |
Fingerprinting and forensic analysis of multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004, pp. 788-795, 2004, ACM, 1-58113-893-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
video, audio, fingerprinting, collusion attack, forensic analysis |
56 | Siyuan Liu, Shuhong Wang 0001, Robert H. Deng, Weizhong Shao |
A Block Oriented Fingerprinting Scheme in Relational Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 455-466, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Fingerprinting, Scheme, Block |
56 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Constructing a virtual primary key for fingerprinting relational data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003, pp. 133-141, 2003, ACM, 1-58113-786-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
primary keys, robustness, relational databases, fingerprinting |
56 | Jonathan Gurary, Ye Zhu 0001, Riccardo Bettati, Yong Guan |
Operating System Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 115-139, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
56 | Paul L. Yu, Brian M. Sadler, Gunjan Verma, John S. Baras |
Fingerprinting by Design: Embedding and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 69-88, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
52 | Jin-Heung Lee, Tea-Hun Lim, Keon-Woo Kim, Sang-Uk Shin |
A New Fingerprinting Codes for Multimedia Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (2) ![In: Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, January 9-12, 2007. Proceedings, Part II, pp. 510-519, 2007, Springer, 978-3-540-69428-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Watermarking for Fingerprinting Code, Trace, Copyrights Protection, Digital Fingerprinting |
51 | Ali Taheri, Arvinder Singh, Emmanuel Agu |
Location Fingerprinting on Infrastructure 802.11 Wireless Local Area Networks Location Fingerprinting on Infrastructure 802.11 Wireless Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 16-18 November 2004, Tampa, FL, USA, Proceedings, pp. 676-683, 2004, IEEE Computer Society, 0-7695-2260-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara |
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 14-28, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Sunil Lee, Chang Dong Yoo |
Robust Video Fingerprinting for Content-Based Video Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 18(7), pp. 983-988, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Salim Outemzabet, Chahé Nerguizian |
Accuracy Enhancement of an Indoor ANN-based Fingerprinting Location System Using Particle Filtering and a Low-Cost Sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 2750-2754, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii |
On the systematic generation of Tardos's fingerprinting codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: International Workshop on Multimedia Signal Processing, MMSP 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia, pp. 748-753, 2008, IEEE Signal Processing Society, 978-1-4244-2295-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Bartlomiej Sieka |
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 179-192, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On |
3D Fingerprinting and Encryption Principle for Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AXMEDIS ![In: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2006, Leeds, UK, December 13-15, 2006, pp. 121-127, 2006, IEEE Computer Society, 0-7695-2625-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | H. Vicky Zhao, K. J. Ray Liu |
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 85-88, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Seunglim Yong, Sang-Ho Lee |
An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 54-66, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-Kyu Lee |
Zero-Based Code Modulation Technique for Digital Video Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1108-1114, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi |
Video Fingerprinting System Using Wavelet and Error Correcting Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 150-164, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Minoru Kuribayashi, Hatsukazu Tanaka |
A Watermarking Scheme Applicable for Fingerprinting Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 532-543, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Gang Qu 0001, Miodrag Potkonjak |
Fingerprinting intellectual property using constraint-addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 37th Conference on Design Automation, Los Angeles, CA, USA, June 5-9, 2000., pp. 587-592, 2000, ACM. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
50 | Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi |
Secure Fingerprinting Using Public-Key Cryptography (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings, pp. 83-89, 1998, Springer, 3-540-65663-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Birgit Pfitzmann, Matthias Schunter |
Asymmetric Fingerprinting (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 84-95, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
49 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 234-241, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz |
On the reliability of wireless fingerprinting using clock skews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 169-174, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fake access point, mac address spoofing, wireless, ieee 802.11, fingerprinting, clock skew, timestamp |
46 | Henar Martín, Paula Tarrío, Ana M. Bernardos, José R. Casar |
Experimental Evaluation of Channel Modelling and Fingerprinting Localization Techniques for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 748-756, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sensor network, fingerprinting, RSS, channel model, indoor |
46 | Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee |
Identifying unique devices through wireless fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 46-55, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
spoof detection, wireless fingerprinting |
46 | Sergey Bratus, Cory Cornelius, David Kotz, Daniel Peebles |
Active behavioral fingerprinting of wireless devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 56-61, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fingerprinting, 802.11, link layer |
46 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Trans. Data Hiding Multim. Secur. 2, pp. 1-34, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking |
46 | Shan He 0002, Darko Kirovski |
An Estimation Attack on Content-Based Video Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Trans. Data Hiding Multim. Secur. 2, pp. 35-47, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
signal estimation, fingerprinting, Video watermarking |
46 | Geong Sen Poh, Keith M. Martin |
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 457-461, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
asymmetric fingerprinting, buyer-seller watermarking, watermarking |
46 | Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung |
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007. Proceedings, pp. 858-867, 2007, Springer, 978-3-540-74281-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Biometrics/Fingerprint, Data Hiding/Fingerprinting, Encryption |
46 | Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano |
Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 992-999, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Informed Coding, Fingerprinting, Informed Embedding |
46 | Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, Michihiko Minoh |
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCAM ![In: Multimedia Content Analysis and Mining, International Workshop, MCAM 2007, Weihai, China, June 30 - July 1, 2007, Proceedings, pp. 252-261, 2007, Springer. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anti-collusion code, affine plane, unital, fingerprinting code, BIBD |
46 | Jae-Min Seol, Seong-Whan Kim |
Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 560-569, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anti-collusion code, Scalable, digital fingerprinting |
46 | Jae-Min Seol, Seong-Whan Kim |
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 328-342, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ACC, LCCA, angular decoding, fingerprinting, BIBD |
46 | Tri Van Le, Mike Burmester, Jiangyi Hu |
Short c-Secure Fingerprinting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 422-427, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
collusion secure, Fingerprinting, copyright protection |
46 | Francesc Sebé, Josep Domingo-Ferrer |
Short 3-Secure Fingerprinting Codes for Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 316-327, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting |
46 | Reihaneh Safavi-Naini, Yejing Wang |
Collusion Secure q-ary Fingerprinting for Perceptual Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 57-75, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Traceability, fingerprinting codes, watermarking schemes |
46 | Hirofumi Muratani |
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 303-315, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack |
46 | Tina Lindkvist |
Characteristics of Some Binary Codes for Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 97-107, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
watermarking, fingerprinting, copyright protection |
45 | Waqas ur Rehman, Eyal de Lara, Stefan Saroiu |
CILoS: a CDMA indoor localization system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2008: Ubiquitous Computing, 10th International Conference, UbiComp 2008, Seoul, Korea, September 21-24, 2008, Proceedings, pp. 104-113, 2008, ACM, 978-1-60558-136-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
localization system, radio fingerprinting, location |
45 | Adam Bates 0001, Devin J. Pohly, Kevin R. B. Butler |
Secure and Trustworthy Provenance Collection for Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 141-176, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes |
Conclusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 177-181, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Gang Qu 0001, Carson Dunbar, Xi Chen, Aijiao Cui |
Digital Fingerprint: A Practical Hardware Security Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 89-114, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Ryan M. Gerdes, Mani Mina, Thomas E. Daniels |
Device Measurement and Origin of Variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 31-38, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Joe H. Novak, Sneha Kumar Kasera, Yong Guan |
Crytpo-Based Methods and Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 39-68, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Davide Zanetti, Srdjan Capkun, Boris Danev |
Types and Origins of Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 5-29, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes |
Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Fingerprinting ![In: Digital Fingerprinting, pp. 1-3, 2016, Springer, 978-1-4939-6599-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Ilya Dumer |
Equal-Weight Fingerprinting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 43-51, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Hendrik Lemelson, Stephan Kopf, Thomas King, Wolfgang Effelsberg |
Improvements for 802.11-Based Location Fingerprinting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 21-28, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor |
Automated Behavioral Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 182-201, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Boris Skoric, Stefan Katzenbeisser 0001, Mehmet Utku Celik |
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(2), pp. 137-166, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94B60 |
41 | Yu-Tzu Lin, Chun-Hsiang Huang, Ja-Ling Wu |
Collusion-resistant video fingerprinting based on temporal oscillation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 3128-3131, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Salim Outemzabet, Chahé Nerguizian |
Accuracy enhancement of an indoor ANN-based fingerprinting location system using Kalman filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Jean-François Jourdas, Pierre Moulin |
Towards optimal design of signal fingerprinting codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 1649-1652, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 134-151, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Minoru Kuribayashi, Masakatu Morii |
Iterative Detection Method for CDMA-Based Fingerprinting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 357-371, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu |
Scalable Multimedia Fingerprinting Forensics with Side Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2293-2296, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Bo Yang 0003, Lin Piyuan, Zhang Wenzheng |
An Efficient Anonymous Fingerprinting Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 824-832, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Dmitry Gavinsky, Julia Kempe, Ronald de Wolf |
Strengths and Weaknesses of Quantum Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 21st Annual IEEE Conference on Computational Complexity (CCC 2006), 16-20 July 2006, Prague, Czech Republic, pp. 288-298, 2006, IEEE Computer Society, 0-7695-2596-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu |
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 14(6), pp. 804-821, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Minoru Kuribayashi, Hatsukazu Tanaka |
Fingerprinting protocol for images based on additive homomorphic property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 14(12), pp. 2129-2139, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Nadia Baaziz, Yamina Sami |
Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFMA ![In: 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 6-9 February 2005, Besançon, France, pp. 210-216, 2005, IEEE Computer Society, 0-7695-2273-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Seunglim Yong, Sang-Ho Lee |
An Efficient Fingerprinting Scheme with Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 192-202, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Eduard Hoenkamp, Sander van Dijk |
Evaluating semantic indexing techniques through cross-language fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2005: Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Salvador, Brazil, August 15-19, 2005, pp. 609-610, 2005, ACM, 1-59593-034-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visualization, evaluation, semantic indexing, CLIR |