The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase collusion-attack (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2004 (15) 2005 (20) 2006 (16) 2007 (16) 2008-2009 (24) 2010-2013 (19) 2014-2017 (16) 2018-2023 (15) 2024 (1)
Publication types (Num. hits)
article(42) inproceedings(100)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 84 occurrences of 52 keywords

Results
Found 142 publication records. Showing 142 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
85Tianjie Cao, Xianping Mao, Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-aided RSA key generation, Handheld device, Collusion attack
78Jae-Min Seol, Seong-Whan Kim Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ACC, LCCA, angular decoding, fingerprinting, BIBD
78Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen Server-Aided RSA Key Generation Against Collusion Attack. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device
78P. Vinod 0002, Prabin Kumar Bora A New Inter-frame Collusion Attack and a Countermeasure. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
78Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua A New Collusion Attack and Its Performance Evaluation. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
74Yongdong Wu, Feng Bao 0001 Collusion attack on a multi-key secure video proxy scheme. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collusion attack
74Yongdong Wu, Robert H. Deng Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
71H. Vicky Zhao, Min Wu 0001, Z. Jane Wang 0001, K. J. Ray Liu Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
69Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
65Jae-Min Seol, Seong-Whan Kim Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
63Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack
61Wei Du, Mingxing He Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Key distribution, self-healing, WSNs, collusion attack
57Shan He 0002, Min Wu 0001 Joint coding and embedding techniques for MultimediaFingerprinting. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Shan He 0002, Min Wu 0001 Performance Study on Multimedia Fingerprinting Employing Traceability Codes. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Karen Su, Deepa Kundur, Dimitrios Hatzinakos Statistical invisibility for collusion-resistant digital video watermarking. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Qingfeng Chen, Shichao Zhang 0001, Yi-Ping Phoebe Chen Identifying Dependency Between Secure Messages for Protocol Analysis. Search on Bibsonomy KSEM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai Some Remarks on Security of Receipt-Free E-auction. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction
53Chao-Yong Hsu, Chun-Shien Lu Near-perfect cover image recovery anti-multiple watermark embedding approaches. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Suphithat Songsiri A New Approach for Computation Result Protection in the Mobile Agent Paradigm. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47K. J. Ray Liu, H. Vicky Zhao Behavior Forensics in Traitors within Traitors for Scalable Multimedia. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47H. Vicky Zhao, K. J. Ray Liu Risk minimization in traitors within traitors in multimedia forensics. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Camélia Constantin, David Gross-Amblard, Meryem Guerrouani Watermill: an optimized fingerprinting system for highly constrained data. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semantic integrity constraints, usability constraints, XML, relational databases, watermarking, fingerprinting
44Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
44Junghyun Nam, Seungjoo Kim, Dongho Won Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Group key agreement, collusion attack, key authentication
43Minseong Ju, Seoksoo Kim, Tai-Hoon Kim A Study on Digital Media Security by Hopfield Neural Network. Search on Bibsonomy ISNN (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Yongdong Wu Nonlinear collusion attack on a watermarking scheme for buyer authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yu Zhang, Zang Li, Wade Trappe Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Xun Yi, Yiming Ye Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Access control, RSA, collusion attack, key assignment
39C.-S. Lu, C.-Y. Hsu Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Chen Yang, Wenping Ma 0002, Xinmei Wang Novel Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Yongdong Wu Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. Search on Bibsonomy ICASSP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Zhongxuan Liu, Shiguo Lian, Yuan Dong, Haila Wang Desynchronized image fingerprint for large scale distribution. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Udit Budhia, Deepa Kundur, Takis Zourntos Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon Assessing the trustworthiness of location data based on provenance. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF location data, trustworthiness
27Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
27Qingyu Xu, Mingxing He, Lein Harn An Improved Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Jin-Heung Lee, Tea-Hun Lim, Keon-Woo Kim, Sang-Uk Shin A New Fingerprinting Codes for Multimedia Contents. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Watermarking for Fingerprinting Code, Trace, Copyrights Protection, Digital Fingerprinting
27Chun-Shien Lu, Chao-Yong Hsu Content-Dependent Anti-disclosure Image Watermark. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Wei-Chi Ku, Shuai-Min Chen An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees. Search on Bibsonomy ICPP Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Wei Yang 0011, Liusheng Huang, Lu Li, Mingjun Xiao, Xiaorong Lu, Yao Shen, Youwen Zhu Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes. Search on Bibsonomy IWQoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code passing, collusion attack, Mobile agent security, malicious hosts
26Koji Nuida An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint
26Minoru Kuribayashi, Hiroshi Kato, Masakatu Morii A Study of Rounding Error on CDMA-Based Fingerprinting Scheme. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fingerprinting, collusion attack, rounding error
26Minoru Kuribayashi A study of traceability of CDMA-based fingerprinting scheme. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iterative detection, fingerprinting, collusion attack
26Gábor Tardos Optimal probabilistic fingerprint codes. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collusion attack, Fingerprint codes
26Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas Collusion-Resistant Video Watermarking Based on Video Mosaicing. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF video watermarking, collusion attack, video mosaicing
26Yingjiu Li, Vipin Swarup, Sushil Jajodia Fingerprinting Relational Databases: Schemes and Specialties. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF robustness, relational database, Fingerprint, collusion attack
26Daniel Schonberg, Darko Kirovski Fingerprinting and forensic analysis of multimedia. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF video, audio, fingerprinting, collusion attack, forensic analysis
25Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson 0002, Nimrod Megiddo Adaptive traitor tracing for large anonymous attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, traitor tracing, content protection
24Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jiande Sun 0001, Ju Liu A blind video watermarking scheme based on ICA and shot segmentation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shot segmentation, independent component analysis, digital watermark, copyright protection, video watermark
24Won-gyum Kim, Young-Ho Suh Short n-secure fingerprinting code for image. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Amir Ghasemkhani, Rutuja Sanjeev Haridas, Seyed Mahmoud Sajjadi Mohammadabadi, Lei Yang 0001 Feature Collusion Attack on PMU Data-driven Event Classification. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Feng Ye, Xianghui Cao, Zheyuan Cheng, Mo-Yuen Chow CASL: A Novel Collusion Attack Against Distributed Energy Management Systems. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Xiaowen Wang, Jie Huang 0016, Chunyang Qi, Yang Peng, Shuaishuai Zhang An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Weidong Du, Min Li, Xiaoyuan Yang 0002, Liqiang Wu, Tanping Zhou VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Xinxin Qi, Xiaodong Fu, Fei Dai 0002, Li Liu 0032, Lijun Liu, Jiaman Ding, Wei Peng 0004 Collusion Attack Analysis and Detection of DPoS Consensus Mechanism. Search on Bibsonomy BlockSys The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Burhan Ul Islam Khan, Farhat Anwar, Rashidah Funke Olanrewaju, Miss Laiha Mat Kiah, Roohie Naaz Mir Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Zhaobo Lu, Jin Wang 0009, Jingya Zhou, Jianping Wang 0001, Kejie Lu Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack. Search on Bibsonomy ICA3PP (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Jun Gu, Tzonelih Hwang Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
21Peter Shaojui Wang Insider Collusion Attack on Distributed Machine Learning System and its Solutions - A Case of SVM. Search on Bibsonomy APKC@AsiaCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21André Nasserala, Ian Vilar Bastos, Igor Monteiro Moraes Cache nFace: a simple countermeasure for the producer-consumer collusion attack in Named Data Networking. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Subhasis Thakur, John G. Breslin Collusion Attack from Hubs in The Blockchain Offline Channel Network. Search on Bibsonomy MARBLE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Tomasz Hyla, Jerzy Pejas Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Ryma Abassi Dealing with Collusion Attack in a Trust-Based MANET. Search on Bibsonomy Cybern. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin 0001 Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures. Search on Bibsonomy ICCCS (5) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. Search on Bibsonomy APSIPA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Tribhuwan Kumar Tewari, Vikas Saxena Collusion Attack Resistant SVD Based Secured Audio Watermarking Scheme with Chaotic Encryption. Search on Bibsonomy IC3 The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Yunhao Liu 0001, Xiaohong Li 0001, Zhiyong Feng 0002, Jianye Hao An Improved Android Collusion Attack Detection Method Based on Program Slicing. Search on Bibsonomy ICFEM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Tomasz Hyla, Jerzy Pejas A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. Search on Bibsonomy CISIM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Yanming Sun, Min Chen 0003, Abel Bacchus, Xiaodong Lin 0001 Towards collusion-attack-resilient group key management using one-way function tree. Search on Bibsonomy Comput. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Peter Shaojui Wang, Feipei Lai, Hsu-Chun Hsiao, Ja-Ling Wu Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jihah Nah, JongWeon Kim Collusion attack-resistant watermarking scheme using correlation peak position modulation. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Wei Yang 0011, Liusheng Huang, Xiaorong Lu, Yao Shen CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes. Search on Bibsonomy SECON The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Yuhong Liu, Na Li 0008 An Advanced Collusion Attack against User Friendship Privacy in OSNs. Search on Bibsonomy COMPSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Tengteng Shen, WenAn Tan, Yong Sun, Li Huang Identifying Collusion Attack Based on Preference Similarity in Mixed Reputation Recommendation Model. Search on Bibsonomy HCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21André Nasserala, Igor Monteiro Moraes Analyzing the producer-consumer collusion attack in Content-Centric Networks. Search on Bibsonomy CCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Md. Zakirul Alam Bhuiyan, Jie Wu 0001 Collusion Attack Detection in Networked Systems. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Hui Feng 0002, Langxiong Gan, Hefei Ling, Fuhao Zou, Zhengding Lu A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Iman Kashefi, Maryam Kassiri, Mazleena Salleh Preventing collusion attack in android. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2015 DBLP  BibTeX  RDF
21Jikai Teng, Chuankun Wu A collusion attack on asymmetric group key exchange. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Seyed Ali Mousavifar, Cyril Leung Centralized Collusion Attack in Cognitive Radio Collaborative Spectrum Sensing. Search on Bibsonomy VTC Fall The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Jalal Etesami, Negar Kiyavash A novel collusion attack on finite alphabet digital fingerprinting systems. Search on Bibsonomy ISIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Sherman S. M. Chow, Man Ho Au, Willy Susilo Server-aided signatures verification secure against collusion attack. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Basit Qureshi, Geyong Min, Demetres D. Kouvatsos Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha Optimized Spread Spectrum Watermarking for Fading-Like Collusion Attack with Improved Detection Performance. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Hui Feng 0002, Hefei Ling, Fuhao Zou, WeiQi Yan 0001, Mudar Sarem, Zhengding Lu A collusion attack optimization framework toward spread-spectrum fingerprinting. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Ang Gao, Zengzhi Li Free global ID against collusion attack on multi-authority attribute-based encryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Hui Feng 0002, Hefei Ling, Fuhao Zou, WeiQi Yan 0001, Zhengding Lu A collusion attack optimization strategy for digital fingerprinting. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Xin-Wei Li, Bao-Long Guo, Xianxiang Wu, Lei-Da Li On Collusion Attack for Digital Fingerprinting. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2011 DBLP  BibTeX  RDF
21Tran Thanh Dai, Johnson I. Agbinya Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Sherman S. M. Chow, Man Ho Au, Willy Susilo Server-aided signatures verification secure against collusion attack. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Ryotaro Hayashi 0001, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Seba Maity, Jaya Sil, Santi P. Maity, Claude Delpha Optimized spread spectrum watermarking for fading-like collusion attack. Search on Bibsonomy WPMC The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 142 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license