|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 16 keywords
|
|
|
Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
87 | Wei-jie Yu, Jun Zhang 0003 |
Pheromone-distribution-based adaptive ant colony system. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
adaptive parameters control, ant colony optimization, travelling salesman problem, ant colony system |
57 | Jiayuan Sui, Douglas R. Stinson |
A Critical Analysis and Improvement of AACS Drive-Host Authentication. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Nelly Fazio, Dulce B. Ponceleon |
Tutorial on content protection. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
4c, aacs, blu-ray disc, broadcast encryption, traitor tracing |
44 | Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang |
Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi |
A Secure Anonymous Authorisation Architecture for E-Commerce. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. |
Sci. China Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Mmachi God'sglory Obiorah, Anne Marie Piper, Michael S. Horn |
Designing AACs for People with Aphasia Dining in Restaurants. |
CHI |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Zhenghao Xin, Liang Liu 0006, Gerhard P. Hancke 0002 |
AACS: Attribute-Based Access Control Mechanism for Smart Locks. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang |
AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions. |
Signal Process. Image Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Bin B. Zhu, Min Feng 0002, Fen Liu, Lei Hu |
Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks. |
CCNC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jiayuan Sui, Douglas R. Stinson |
A Critical Analysis and Improvement of AACS Drive-Host Authentication. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
31 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. |
ACM Multimedia |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
22 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo |
Efficient Coalition Detection in Traitor Tracing. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Yongxin Zhou 0002, Alec Main, Yuan Xiang Gu, Harold Johnson |
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin, Jeffery Lotspiech |
Hybrid Traitor Tracing. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sheng Mei Shen |
Intellectual Property Management & Protection and Digital Right Management in MPEG. |
CIVR |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #19 of 19 (100 per page; Change: )
|
|