The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for aacs with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2009 (15) 2010-2023 (4)
Publication types (Num. hits)
article(4) inproceedings(15)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 16 keywords

Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
87Wei-jie Yu, Jun Zhang 0003 Pheromone-distribution-based adaptive ant colony system. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adaptive parameters control, ant colony optimization, travelling salesman problem, ant colony system
57Jiayuan Sui, Douglas R. Stinson A Critical Analysis and Improvement of AACS Drive-Host Authentication. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Nelly Fazio, Dulce B. Ponceleon Tutorial on content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 4c, aacs, blu-ray disc, broadcast encryption, traitor tracing
44Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Aggelos Kiayias, Serdar Pehlivanoglu Pirate Evolution: How to Make the Most of Your Traitor Keys. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi A Secure Anonymous Authorisation Architecture for E-Commerce. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Mmachi God'sglory Obiorah, Anne Marie Piper, Michael S. Horn Designing AACs for People with Aphasia Dining in Restaurants. Search on Bibsonomy CHI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
35Zhenghao Xin, Liang Liu 0006, Gerhard P. Hancke 0002 AACS: Attribute-Based Access Control Mechanism for Smart Locks. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions. Search on Bibsonomy Signal Process. Image Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Bin B. Zhu, Min Feng 0002, Fen Liu, Lei Hu Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks. Search on Bibsonomy CCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Jiayuan Sui, Douglas R. Stinson A Critical Analysis and Improvement of AACS Drive-Host Authentication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
31Dulce B. Ponceleon, Julian A. Cerruti Multimedia content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy
22Aggelos Kiayias, Serdar Pehlivanoglu Tracing and Revoking Pirate Rebroadcasts. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo Efficient Coalition Detection in Traitor Tracing. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Yongxin Zhou 0002, Alec Main, Yuan Xiang Gu, Harold Johnson Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hongxia Jin, Jeffery Lotspiech Hybrid Traitor Tracing. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Sheng Mei Shen Intellectual Property Management & Protection and Digital Right Management in MPEG. Search on Bibsonomy CIVR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #19 of 19 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license