The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Tamper-proofing (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2004 (18) 2005-2008 (18) 2009-2019 (17) 2020-2023 (5)
Publication types (Num. hits)
article(20) inproceedings(38)
Venues (Conferences, Journals, ...)
AsiaCCS(2) CoRR(2) ICIP(2) ISCAS(2) Multim. Tools Appl.(2) ACM SIGPLAN Notices(1) ACM Trans. Inf. Syst. Secur.(1) AIPR(1) APCC(1) ARC(1) ATC(1) CISST(1) Computer(1) CVPR Workshops(1) DATE(1) EUSIPCO(1) More (+10 of total 53)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 75 occurrences of 56 keywords

Results
Found 58 publication records. Showing 58 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
132Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
116Tong Liu, Jiya Jiang, Ying Li Research on File Content Tamper-proofing System for Distribution Environment. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
116Kuo-Lung Hung, Chin-Chen Chang 0001 Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
116Hsiang-Yang Chen, Ting-Wei Hou, Chun-Liang Lin Tamper-proofing basis path by using oblivious hashing on Java. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2007 DBLP  DOI  BibTeX  RDF basis paths, oblivious hashing, Java, Java, tamper-proofing
106Soo-Chang Pei, Yi-Chong Zeng Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack identification, visual cryptography, semi-fragile watermarking, multiple-watermark, tamper proofing
106Christian S. Collberg, Clark D. Thomborson Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermarking, Obfuscation, intellectual property protection, tamper-proofing
80Parag Agarwal, Balakrishnan Prabhakaran 0001 Tamper Proofing 3D Motion Data Streams. Search on Bibsonomy MMM (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF watermarking, encoding, motion, decoding, data, Tamper proofing
80Taejoon Park, Kang G. Shin Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF program-integrity verification, a randomized hash function, sensor networks, Tamper-proofing
74Kuo-Lung Hung, Chin-Chen Chang 0001 A Robust and Recoverable Tamper Proofing Technique for Image Authentication. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Parag Agarwal, Balakrishnan Prabhakaran 0001 Tamper proofing mechanisms for motion capture data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, encoding, decoding, blind, spatial
64Saar Drimer, Steven J. Murdoch, Ross J. Anderson Thinking Inside the Box: System-Level Failures of Tamper Proofing. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV
64Sang-Jin Han, In Su Chang, Rae-Hong Park Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Erdinç Öztürk, Ghaith Hammouri, Berk Sunar Physical unclonable function with tristate buffers. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Jun-Chou Chuang, Chin-Chen Chang 0001 An Image Authentication Scheme for Halftone Images Based upon Error Diffusion. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image tamper proofing, Image authentication, Halftone, error diffusion
42Patrick Cousot, Radhia Cousot An abstract interpretation-based framework for software watermarking. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing
38MingQuan Fan Blind Dual Image Watermarking for Copyright Protection, Tamper Proofing and Self-Recovery. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Irtaza Shahid, Nirupam Roy "Is this my president speaking?" Tamper-proofing Speech in Live Recordings. Search on Bibsonomy MobiSys The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Collins Sey, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Seth Larweh Kodjiku, Isaac Adjei Mensah, Isaac Osei Agyemang VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Robert Keller, Olivier Thereaux Tamper-Proofing Video With Hierarchical Attention Autoencoder Hashing on Blockchain. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
38Alexander D. Wissner-Gross, Jared C. Willard, Noah Weston Tamper-Proofing Imagery from Distributed Sensors Using Learned Blockchain Consensus. Search on Bibsonomy AIPR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
38Sheng Cao, Gexiang Zhang, Pengfei Liu, Xiaosong Zhang 0001, Ferrante Neri Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Hwai-Tsu Hu, Tung-Tsun Lee Hybrid Blind Audio Watermarking for Proprietary Protection, Tamper Proofing, and Self-Recovery. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
38Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown ARCHANGEL: Tamper-Proofing Video Archives Using Temporal Content Hashes on the Blockchain. Search on Bibsonomy CVPR Workshops The full citation details ... 2019 DBLP  BibTeX  RDF
38Rajesh Kumar Shrivastava, Kevin Jude Concessao, Chittaranjan Hota Code Tamper-Proofing using Dynamic Canaries. Search on Bibsonomy APCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Zhe Chen, Zhi Wang 0014, Chunfu Jia Semantic-integrated software watermarking with tamper-proofing. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li 0011 Harden Tamper-Proofing to Combat MATE Attack. Search on Bibsonomy ICA3PP (4) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Padmapriya Praveenkumar, P. Catherine Priya, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Jianqi Zhu, Yanheng Liu, Aimin Wang, KeXin Yin H Function based Tamper-proofing Software Watermarking Scheme. Search on Bibsonomy J. Softw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Malik Sikandar Hayat Khiyal, Aihab Khan, Sehrish Amjad, M. Shahid Khalil Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
38Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motwani, Frederick C. Harris Jr. Tamper Proofing 3D Models. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF 3D mesh model, genetic algorithms, fragile watermarking, SNR
38Hesham El Zouka Tamper-Proofing Based on Quadtree Algorithm. Search on Bibsonomy IPCV The full citation details ... 2010 DBLP  BibTeX  RDF
38Saar Drimer, Steven J. Murdoch, Ross J. Anderson Failures of Tamper-Proofing in PIN Entry Devices. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Dan Li 0012, Yingsong Hu, Xiangxiao Hu, Hefei Ling Self-Checking Tamper-Proofing Based on Software Behavior Model. Search on Bibsonomy FCST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Samia Boucherkha, Mohamed Benmohamed Using Statistical Texture Analysis for Medical Image Tamper Proofing. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. Search on Bibsonomy Security, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Yu Liu, Charles G. Boncelet Jr. The Crc-Ntmac for Image Tamper Proofing and Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Po-Whei Huang, An-Wei Peng, Phen-Lan Lin VQ Attack Resilient and Tamper Proofing Digital Watermark for Image Authentication and Recovery. Search on Bibsonomy CISST The full citation details ... 2004 DBLP  BibTeX  RDF
38Hisashi Inoue, Akio Miyazaki, Takashi Katsura Wavelet-Based Watermarking for Tamper Proofing of Still Images. Search on Bibsonomy ICIP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Anastasios Tefas, Ioannis Pitas Image authentication and tamper proofing using mathematical morphology. Search on Bibsonomy EUSIPCO The full citation details ... 2000 DBLP  BibTeX  RDF
38Deepa Kundur, Dimitrios Hatzinakos Digital watermarking for telltale tamper proofing and authentication. Search on Bibsonomy Proc. IEEE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
38Deepa Kundur, Dimitrios Hatzinakos Towards a Telltale Watermarking Technique for Tamper-Proofing. Search on Bibsonomy ICIP (2) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Phu H. Phung, David Sands 0001, Andrey Chudnov Lightweight self-protecting JavaScript. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF programming, JavaScript, language based security, inlined reference monitors
26Saar Drimer, Markus G. Kuhn A Protocol for Secure Remote Updates of FPGA Configurations. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Katharine Chang, Kang G. Shin Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed authentication, node revocation, program integrity verification, wireless sensor networks
26Rakhi C. Motwani, Ameya Ambardekar, Mukesh C. Motwani, Frederick C. Harris Jr. Robust watermarking of 3D skinning mesh animations. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kankanhalli Quality-aware GSM speech watermarking. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Paulo Mateus, Filipe Moura, João Rasga Transfering Proofs of Zero-Knowledge Systems with Quantum Correlations. Search on Bibsonomy ICQNM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Ronghui Tu, Feiyuan Wang, Jiying Zhao, Abdulmotaleb El-Saddik Copyright Protection ofWeb Applications throughWatermarking. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Christian S. Collberg, Edward Carter, Saumya K. Debray, Andrew Huntwork, John D. Kececioglu, Cullen Linn, Michael Stepp Dynamic path-based software watermarking. Search on Bibsonomy PLDI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF watermarking, software protection, software piracy
26Jun-Chou Chuang, Chin-Chen Chang 0001 Detection and Restoration of a Tampered Medical Image. Search on Bibsonomy MIAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentication, watermarking, medical imaging, confidentiality
26Sabu Emmanuel, Mohan S. Kankanhalli A digital rights management scheme for broadcast video. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting
26Gleb Naumovich, Nasir D. Memon Preventing Piracy, Reverse Engineering, and Tampering. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Anand Raghunathan, Srivaths Ravi 0001, Sunil Hattangady, Jean-Jacques Quisquater Securing Mobile Appliances: New Challenges for the System Designer. Search on Bibsonomy DATE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Ginger Myles, Christian S. Collberg Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Copyright protection, register allocation, Java bytecode, software piracy, software watermarking
26Haiping Lu, Alex C. Kot, Jun Cheng 0003 Secure data hiding in binary document images for authentication. Search on Bibsonomy ISCAS (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Michael G. Wagner Robust Watermarking of Polygonal Meshes. Search on Bibsonomy GMP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Tomio Amano, Daigo Misaki A Feature Calibration Method for Watermarking of Document Images. Search on Bibsonomy ICDAR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #58 of 58 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license