The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for collusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1998 (15) 1999-2001 (31) 2002 (26) 2003 (52) 2004 (39) 2005 (87) 2006 (89) 2007 (87) 2008 (86) 2009 (78) 2010 (49) 2011 (46) 2012 (34) 2013 (40) 2014 (41) 2015 (28) 2016 (63) 2017 (45) 2018 (48) 2019 (46) 2020 (65) 2021 (59) 2022 (64) 2023 (74) 2024 (21)
Publication types (Num. hits)
article(544) incollection(5) inproceedings(757) phdthesis(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 491 occurrences of 278 keywords

Results
Found 1313 publication records. Showing 1313 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
91Girish Keshav Palshikar, Manoj M. Apte Collusion set detection using graph clustering. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion set, Clustering, Graph clustering, Fraud detection
91Ara Hayrapetyan, Éva Tardos, Tom Wexler The effect of collusion in congestion games. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF price of collusion, load-balancing, games, game theory, price of anarchy, congestion games, coalitions
83Qiao Lian, Zheng Zhang 0001, Mao Yang, Ben Y. Zhao, Yafei Dai, Xiaoming Li An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Yan Zhu 0010, Dengguo Feng, Wei Zou Collusion Secure Convolutional Spread Spectrum Fingerprinting. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collusion secure, Convolutional code, Spread spectrum, Digital fingerprinting
74Jae-Min Seol, Seong-Whan Kim Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ACC, LCCA, angular decoding, fingerprinting, BIBD
74H. Vicky Zhao, Min Wu 0001, Z. Jane Wang 0001, K. J. Ray Liu Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
71Paolo Penna, Carmine Ventre Optimal collusion-resistant mechanisms with verification. Search on Bibsonomy EC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transferable utilities, algorithmic mechanism design, collusion
71Stefania Di Giannantonio, Michele Flammini, Gianpiero Monaco, Luca Moscardelli, Mordechai Shalom, Shmuel Zaks Selfishness, Collusion and Power of Local Search for the ADMs Minimization Problem. Search on Bibsonomy WINE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Price of Collusion, Game Theory, Optical Networks, Price of Anarchy, Wavelength Division Multiplexing (WDM), Nash Equilibria, Add-Drop Multiplexer (ADM)
71Jae-Min Seol, Seong-Whan Kim Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anti-collusion code, Scalable, digital fingerprinting
71Bertis B. Little, Walter L. Johnston, Ashley C. Lovell, Roderick M. Rejesus, Steve A. Steed Collusion in the U.S. crop insurance program: applied data mining. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF doublets, insurance fraud, non-recursive, triplets, collusion, log linear models
64Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti Collusion-Free Multiparty Computation in the Mediated Model. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
64Shiguo Lian, Zhiquan Wang Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Zhu Ji, K. J. Ray Liu Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Yu-Tzu Lin, Chun-Hsiang Huang, Ja-Ling Wu Collusion-resistant video fingerprinting based on temporal oscillation. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64H. Vicky Zhao, K. J. Ray Liu Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Karen Su, Deepa Kundur, Dimitrios Hatzinakos Statistical invisibility for collusion-resistant digital video watermarking. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Bezawada Bruhadeshwar, Kishore Kothapalli A Family of Collusion Resistant Symmetric Key Protocols for Authentication. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Key Distribution, Collusion resistance
61Joël Alwen, Abhi Shelat, Ivan Visconti Collusion-Free Protocols in the Mediated Model. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Collusion Free, ZKPoK, Commitments, Mediated Communication
61Sheng Zhong 0002, Fan Wu On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing, wireless ad hoc networks, collusion
61Sandeep S. Kulkarni, Bezawada Bruhadeshwar A Family of Collusion Resistant Protocols for Instantiating Security. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Instantiating security, Security, Collusion Resistance
61Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack
59Stefan Katzenbeisser 0001, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi Combining Tardos Fingerprinting Codes and Fingercasting. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda Hop Chains: Secure Routing and the Establishment of Distinct Identities. Search on Bibsonomy OPODIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Tianjie Cao, Xianping Mao, Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-aided RSA key generation, Handheld device, Collusion attack
57Shan He 0002, Min Wu 0001 Building efficient and effective multimedia fingerprints via joint coding and embedding. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multimedia fingerprinting, error correcting code, collusion resistance
54M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Jae-Min Seol, Seong-Whan Kim Statistically Secure Extension of Anti-collusion Code Fingerprinting. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Matt Lepinski, Silvio Micali, Abhi Shelat Collusion-free protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF steganography, secure function evaluation
51Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code passing, collusion attack, Mobile agent security, malicious hosts
51Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen Server-Aided RSA Key Generation Against Collusion Attack. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device
51Yongdong Wu, Feng Bao 0001 Collusion attack on a multi-key secure video proxy scheme. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collusion attack
51Gérard D. Cohen, Simon Litsyn, Gilles Zémor Binary Codes for Collusion-Secure Fingerprinting. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Collusion-resistant code, intersecting code, B2-sequence, watermarking, Fingerprinting
49Jae-Min Seol, Seong-Whan Kim Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Shan He 0002, Min Wu 0001 Joint coding and embedding techniques for MultimediaFingerprinting. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49H. Vicky Zhao, K. J. Ray Liu Selfish Colluder Detection and Identification in Traitors within Traitors. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Shan He 0002, Min Wu 0001 Performance Study on Multimedia Fingerprinting Employing Traceability Codes. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Hans Georg Schaathun On error-correcting fingerprinting codes for use with watermarking. Search on Bibsonomy Multim. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion-secure fingerprinting, Watermarking, Error-correcting codes, Copyright protection, Soft-decision decoding
47Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, Michihiko Minoh Fingerprinting Codes for Live Pay-Television Broadcast Via Internet. Search on Bibsonomy MCAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-collusion code, affine plane, unital, fingerprinting code, BIBD
47Hans Georg Schaathun On Watermarking/Fingerprinting for Copyright Protection. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collusion-secure fingerprinting, watermarking, error-correcting codes, copyright protection, soft-decision decoding
47Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai Some Remarks on Security of Receipt-Free E-auction. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction
44H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu Game-theoretic analysis of maximum-payoff multiuser collusion. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44David P. Varodayan, Christine Pépin Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Shan He 0002, Min Wu 0001 Collusion-Resistant Video Fingerprinting for Large User Group. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Avinash L. Varna, Shan He 0002, Ashwin Swaminathan, Min Wu 0001 Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Tony Hoare Science and Engineering: A Collusion of Cultures. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Kannan Karthik, Dimitrios Hatzinakos A novel anti-collusion coding scheme tailored to track linear collusions. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Shan He 0002, Min Wu 0001 Collusion-Resistant video Fingerprinting for Large User Group. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Walid Bagga, Refik Molva Collusion-Free Policy-Based Encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Policy, Credentials, Pairing-Based Cryptography
44Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Byung-Ho Cha, C.-C. Jay Kuo Design of Collusion-Free Codes Based on MAI-Free Principle. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Qingfeng Chen, Yi-Ping Phoebe Chen, Shichao Zhang 0001, Chengqi Zhang Detecting Collusion Attacks in Security Protocols. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Karen Su, Deepa Kundur, Dimitrios Hatzinakos Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44H. Vicky Zhao, K. J. Ray Liu Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy Key management in wireless ad hoc networks: collusion analysis and prevention. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44P. Vinod 0002, Prabin Kumar Bora A New Inter-frame Collusion Attack and a Countermeasure. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam Collusion Set Detection Through Outlier Discovery. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Jae-Min Seol, Seong-Whan Kim Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Steven J. Murdoch, Piotr Zielinski Covert Channels for Collusion in Online Computer Games. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Chris Peikert, Abhi Shelat, Adam D. Smith Lower bounds for collusion-secure fingerprinting. Search on Bibsonomy SODA The full citation details ... 2003 DBLP  BibTeX  RDF
44Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Yongdong Wu, Robert H. Deng Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua A New Collusion Attack and Its Performance Evaluation. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Shigeo Matsubara Adaptive pricing that can withstand buyer collusion of false-type-declaration. Search on Bibsonomy EC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44Josep Domingo-Ferrer, Jordi Herrera-Joancomartí Simple Collusion-Secure Fingerprinting Schemes for Images. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
42Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma Collusion-resistant privacy-preserving data mining. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining, privacy, distributed, secure multiparty computation, collusion
42Wei Du, Mingxing He Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Key distribution, self-healing, WSNs, collusion attack
42Jun Furukawa 0001, Nuttapong Attrapadung Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box
42Radu Jurca, Boi Faltings Collusion-resistant, incentive-compatible feedback payments. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mechanism design, incentive compatibility, reputation mechanisms, collusion resistance
42Marc Rennhard, Bernhard Plattner Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. Search on Bibsonomy WPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collusion detection, anonymity, peer-to-peer systems, mix networks
42Funda Ergün, Joe Kilian, Ravi Kumar 0001 A Note on the Limits of Collusion-Resistant Watermarks. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Watermarking, Intellectual Property Protection, Collusion Resistance
39Byung-Ho Cha, C.-C. Jay Kuo Advanced colluder detection techniques for OSIFT-based hiding codes. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Jarrod Trevathan, Wayne Read Detecting Collusive Shill Bidding. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Minseong Ju, Seoksoo Kim, Tai-Hoon Kim A Study on Digital Media Security by Hopfield Neural Network. Search on Bibsonomy ISNN (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39K. J. Ray Liu, H. Vicky Zhao Behavior Forensics in Traitors within Traitors for Scalable Multimedia. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Justin Brickell, Vitaly Shmatikov Efficient anonymity-preserving data collection. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, privacy, anonymity
39H. Vicky Zhao, K. J. Ray Liu Risk minimization in traitors within traitors in multimedia forensics. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Camélia Constantin, David Gross-Amblard, Meryem Guerrouani Watermill: an optimized fingerprinting system for highly constrained data. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semantic integrity constraints, usability constraints, XML, relational databases, watermarking, fingerprinting
39Hans Georg Schaathun Fighting Two Pirates. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39David Chaum The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
37Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
37Koji Nuida An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint
37Yi-Hua E. Yang, Joseph D. Touch Protocol Family for Optimal and Deterministic Symmetric Key Assignment. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code
37Fuchun Xie, Teddy Furon, Caroline Fontaine On-off keying modulation and tardos fingerprinting. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-collusion, watermarking, fingerprinting
37André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking
37Daniel Schonberg, Darko Kirovski Fingerprinting and forensic analysis of multimedia. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF video, audio, fingerprinting, collusion attack, forensic analysis
34Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern Manipulating Scrip Systems: Sybils and Collusion. Search on Bibsonomy AMMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Mafruz Zaman Ashrafi, See-Kiong Ng Collusion-resistant anonymous data collection method. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, privacy, anonymity
34Patrick Maillé, Maurizio Naldi, Bruno Tuffin Understanding and Preventing Tacit Collusion among Telecommunication Operators. Search on Bibsonomy NET-COOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Game theory, Competition, Repeated games
34Amirali Salehi-Abari, Tony White Witness-Based Collusion and Trust-Aware Societies. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Dusit Niyato, Ekram Hossain 0001 Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Olivier Billet, Duong Hieu Phan Efficient Traitor Tracing from Collusion Secure Codes. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Wen Ji, Shoubao Yang, Bo Chen A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1313 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license