Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
91 | Girish Keshav Palshikar, Manoj M. Apte |
Collusion set detection using graph clustering. |
Data Min. Knowl. Discov. |
2008 |
DBLP DOI BibTeX RDF |
Collusion set, Clustering, Graph clustering, Fraud detection |
91 | Ara Hayrapetyan, Éva Tardos, Tom Wexler |
The effect of collusion in congestion games. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
price of collusion, load-balancing, games, game theory, price of anarchy, congestion games, coalitions |
83 | Qiao Lian, Zheng Zhang 0001, Mao Yang, Ben Y. Zhao, Yafei Dai, Xiaoming Li |
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
81 | Yan Zhu 0010, Dengguo Feng, Wei Zou |
Collusion Secure Convolutional Spread Spectrum Fingerprinting. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
Collusion secure, Convolutional code, Spread spectrum, Digital fingerprinting |
74 | Jae-Min Seol, Seong-Whan Kim |
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
ACC, LCCA, angular decoding, fingerprinting, BIBD |
74 | H. Vicky Zhao, Min Wu 0001, Z. Jane Wang 0001, K. J. Ray Liu |
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
71 | Paolo Penna, Carmine Ventre |
Optimal collusion-resistant mechanisms with verification. |
EC |
2009 |
DBLP DOI BibTeX RDF |
transferable utilities, algorithmic mechanism design, collusion |
71 | Stefania Di Giannantonio, Michele Flammini, Gianpiero Monaco, Luca Moscardelli, Mordechai Shalom, Shmuel Zaks |
Selfishness, Collusion and Power of Local Search for the ADMs Minimization Problem. |
WINE |
2007 |
DBLP DOI BibTeX RDF |
Price of Collusion, Game Theory, Optical Networks, Price of Anarchy, Wavelength Division Multiplexing (WDM), Nash Equilibria, Add-Drop Multiplexer (ADM) |
71 | Jae-Min Seol, Seong-Whan Kim |
Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
anti-collusion code, Scalable, digital fingerprinting |
71 | Bertis B. Little, Walter L. Johnston, Ashley C. Lovell, Roderick M. Rejesus, Steve A. Steed |
Collusion in the U.S. crop insurance program: applied data mining. |
KDD |
2002 |
DBLP DOI BibTeX RDF |
doublets, insurance fraud, non-recursive, triplets, collusion, log linear models |
64 | Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti |
Collusion-Free Multiparty Computation in the Mediated Model. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Shiguo Lian, Zhiquan Wang |
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation. |
IEEE Trans. Circuits Syst. Video Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Zhu Ji, K. J. Ray Liu |
Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation. |
IEEE J. Sel. Areas Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Yu-Tzu Lin, Chun-Hsiang Huang, Ja-Ling Wu |
Collusion-resistant video fingerprinting based on temporal oscillation. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 |
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
64 | H. Vicky Zhao, K. J. Ray Liu |
Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Statistical invisibility for collusion-resistant digital video watermarking. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu |
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Bezawada Bruhadeshwar, Kishore Kothapalli |
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. |
ICDCN |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Collusion resistance |
61 | Joël Alwen, Abhi Shelat, Ivan Visconti |
Collusion-Free Protocols in the Mediated Model. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Secure Collusion Free, ZKPoK, Commitments, Mediated Communication |
61 | Sheng Zhong 0002, Fan Wu |
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. |
MobiCom |
2007 |
DBLP DOI BibTeX RDF |
routing, wireless ad hoc networks, collusion |
61 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar |
A Family of Collusion Resistant Protocols for Instantiating Security. |
ICNP |
2005 |
DBLP DOI BibTeX RDF |
Instantiating security, Security, Collusion Resistance |
61 | Hirofumi Muratani |
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack |
59 | Stefan Katzenbeisser 0001, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi |
Combining Tardos Fingerprinting Codes and Fingercasting. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda |
Hop Chains: Secure Routing and the Establishment of Distinct Identities. |
OPODIS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Tianjie Cao, Xianping Mao, Dongdai Lin |
Security Analysis of a Server-Aided RSA Key Generation Protocol. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Server-aided RSA key generation, Handheld device, Collusion attack |
57 | Shan He 0002, Min Wu 0001 |
Building efficient and effective multimedia fingerprints via joint coding and embedding. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
multimedia fingerprinting, error correcting code, collusion resistance |
54 | M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy |
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu |
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics. |
ICIP (6) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Jae-Min Seol, Seong-Whan Kim |
Statistically Secure Extension of Anti-collusion Code Fingerprinting. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Collusion-free protocols. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
steganography, secure function evaluation |
51 | Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz |
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
code passing, collusion attack, Mobile agent security, malicious hosts |
51 | Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen |
Server-Aided RSA Key Generation Against Collusion Attack. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device |
51 | Yongdong Wu, Feng Bao 0001 |
Collusion attack on a multi-key secure video proxy scheme. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
collusion attack |
51 | Gérard D. Cohen, Simon Litsyn, Gilles Zémor |
Binary Codes for Collusion-Secure Fingerprinting. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Collusion-resistant code, intersecting code, B2-sequence, watermarking, Fingerprinting |
49 | Jae-Min Seol, Seong-Whan Kim |
Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Shan He 0002, Min Wu 0001 |
Joint coding and embedding techniques for MultimediaFingerprinting. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
49 | H. Vicky Zhao, K. J. Ray Liu |
Selfish Colluder Detection and Identification in Traitors within Traitors. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Shan He 0002, Min Wu 0001 |
Performance Study on Multimedia Fingerprinting Employing Traceability Codes. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Hans Georg Schaathun |
On error-correcting fingerprinting codes for use with watermarking. |
Multim. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Collusion-secure fingerprinting, Watermarking, Error-correcting codes, Copyright protection, Soft-decision decoding |
47 | Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, Michihiko Minoh |
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet. |
MCAM |
2007 |
DBLP DOI BibTeX RDF |
anti-collusion code, affine plane, unital, fingerprinting code, BIBD |
47 | Hans Georg Schaathun |
On Watermarking/Fingerprinting for Copyright Protection. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
collusion-secure fingerprinting, watermarking, error-correcting codes, copyright protection, soft-decision decoding |
47 | Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai |
Some Remarks on Security of Receipt-Free E-auction. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction |
44 | H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu |
Game-theoretic analysis of maximum-payoff multiuser collusion. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
44 | David P. Varodayan, Christine Pépin |
Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant Video Fingerprinting for Large User Group. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Avinash L. Varna, Shan He 0002, Ashwin Swaminathan, Min Wu 0001 |
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Tony Hoare |
Science and Engineering: A Collusion of Cultures. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Kannan Karthik, Dimitrios Hatzinakos |
A novel anti-collusion coding scheme tailored to track linear collusions. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood |
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant video Fingerprinting for Large User Group. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
44 | Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa |
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Byung-Ho Cha, C.-C. Jay Kuo |
Design of Collusion-Free Codes Based on MAI-Free Principle. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Qingfeng Chen, Yi-Ping Phoebe Chen, Shichao Zhang 0001, Chengqi Zhang |
Detecting Collusion Attacks in Security Protocols. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
44 | H. Vicky Zhao, K. J. Ray Liu |
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Key management in wireless ad hoc networks: collusion analysis and prevention. |
IPCCC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | P. Vinod 0002, Prabin Kumar Bora |
A New Inter-frame Collusion Attack and a Countermeasure. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota |
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam |
Collusion Set Detection Through Outlier Discovery. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jae-Min Seol, Seong-Whan Kim |
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Steven J. Murdoch, Piotr Zielinski |
Covert Channels for Collusion in Online Computer Games. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Chris Peikert, Abhi Shelat, Adam D. Smith |
Lower bounds for collusion-secure fingerprinting. |
SODA |
2003 |
DBLP BibTeX RDF |
|
44 | Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto |
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Yongdong Wu, Robert H. Deng |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua |
A New Collusion Attack and Its Performance Evaluation. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Shigeo Matsubara |
Adaptive pricing that can withstand buyer collusion of false-type-declaration. |
EC |
2001 |
DBLP DOI BibTeX RDF |
|
44 | Josep Domingo-Ferrer, Jordi Herrera-Joancomartí |
Simple Collusion-Secure Fingerprinting Schemes for Images. |
ITCC |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma |
Collusion-resistant privacy-preserving data mining. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
data mining, privacy, distributed, secure multiparty computation, collusion |
42 | Wei Du, Mingxing He |
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
security, Key distribution, self-healing, WSNs, collusion attack |
42 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
42 | Radu Jurca, Boi Faltings |
Collusion-resistant, incentive-compatible feedback payments. |
EC |
2007 |
DBLP DOI BibTeX RDF |
mechanism design, incentive compatibility, reputation mechanisms, collusion resistance |
42 | Marc Rennhard, Bernhard Plattner |
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
collusion detection, anonymity, peer-to-peer systems, mix networks |
42 | Funda Ergün, Joe Kilian, Ravi Kumar 0001 |
A Note on the Limits of Collusion-Resistant Watermarks. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Watermarking, Intellectual Property Protection, Collusion Resistance |
39 | Byung-Ho Cha, C.-C. Jay Kuo |
Advanced colluder detection techniques for OSIFT-based hiding codes. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Jarrod Trevathan, Wayne Read |
Detecting Collusive Shill Bidding. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Minseong Ju, Seoksoo Kim, Tai-Hoon Kim |
A Study on Digital Media Security by Hopfield Neural Network. |
ISNN (3) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li |
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | K. J. Ray Liu, H. Vicky Zhao |
Behavior Forensics in Traitors within Traitors for Scalable Multimedia. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Justin Brickell, Vitaly Shmatikov |
Efficient anonymity-preserving data collection. |
KDD |
2006 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity |
39 | H. Vicky Zhao, K. J. Ray Liu |
Risk minimization in traitors within traitors in multimedia forensics. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Camélia Constantin, David Gross-Amblard, Meryem Guerrouani |
Watermill: an optimized fingerprinting system for highly constrained data. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
semantic integrity constraints, usability constraints, XML, relational databases, watermarking, fingerprinting |
39 | Hans Georg Schaathun |
Fighting Two Pirates. |
AAECC |
2003 |
DBLP DOI BibTeX RDF |
|
39 | David Chaum |
The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
37 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
37 | Koji Nuida |
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint |
37 | Yi-Hua E. Yang, Joseph D. Touch |
Protocol Family for Optimal and Deterministic Symmetric Key Assignment. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code |
37 | Fuchun Xie, Teddy Furon, Caroline Fontaine |
On-off keying modulation and tardos fingerprinting. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
anti-collusion, watermarking, fingerprinting |
37 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking |
37 | Daniel Schonberg, Darko Kirovski |
Fingerprinting and forensic analysis of multimedia. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
video, audio, fingerprinting, collusion attack, forensic analysis |
34 | Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern |
Manipulating Scrip Systems: Sybils and Collusion. |
AMMA |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Mafruz Zaman Ashrafi, See-Kiong Ng |
Collusion-resistant anonymous data collection method. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity |
34 | Patrick Maillé, Maurizio Naldi, Bruno Tuffin |
Understanding and Preventing Tacit Collusion among Telecommunication Operators. |
NET-COOP |
2009 |
DBLP DOI BibTeX RDF |
Game theory, Competition, Repeated games |
34 | Amirali Salehi-Abari, Tony White |
Witness-Based Collusion and Trust-Aware Societies. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Dusit Niyato, Ekram Hossain 0001 |
Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion. |
IEEE J. Sel. Areas Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Olivier Billet, Duong Hieu Phan |
Efficient Traitor Tracing from Collusion Secure Codes. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon |
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Wen Ji, Shoubao Yang, Bo Chen |
A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya |
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|