Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
90 | Shan He 0002, Min Wu 0001 |
Building efficient and effective multimedia fingerprints via joint coding and embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 127-136, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multimedia fingerprinting, error correcting code, collusion resistance |
78 | Stefan Katzenbeisser 0001, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi |
Combining Tardos Fingerprinting Codes and Fingercasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 294-310, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Shan He 0002, Min Wu 0001 |
Joint coding and embedding techniques for MultimediaFingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 231-247, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Shan He 0002, Min Wu 0001 |
Performance Study on Multimedia Fingerprinting Employing Traceability Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 84-96, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
68 | Bezawada Bruhadeshwar, Kishore Kothapalli |
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008., pp. 387-392, 2008, Springer, 978-3-540-77443-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Collusion resistance |
68 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar |
A Family of Collusion Resistant Protocols for Instantiating Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA, pp. 279-288, 2005, IEEE Computer Society, 0-7695-2437-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Instantiating security, Security, Collusion Resistance |
67 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(1), pp. 52-66, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu |
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 14(6), pp. 804-821, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 357-376, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
56 | Yu-Tzu Lin, Chun-Hsiang Huang, Ja-Ling Wu |
Collusion-resistant video fingerprinting based on temporal oscillation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 3128-3131, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | H. Vicky Zhao, K. J. Ray Liu |
Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(3), pp. 311-329, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Statistical invisibility for collusion-resistant digital video watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(1), pp. 43-51, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Justin Brickell, Vitaly Shmatikov |
Efficient anonymity-preserving data collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 76-85, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity |
49 | Jessica Staddon |
Dynamic inference control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMKD ![In: Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD 2003, San Diego, California, USA, June 13, 2003, pp. 94-100, 2003, ACM. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 331-346, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
48 | Funda Ergün, Joe Kilian, Ravi Kumar 0001 |
A Note on the Limits of Collusion-Resistant Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 140-149, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Watermarking, Intellectual Property Protection, Collusion Resistance |
42 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant Video Fingerprinting for Large User Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(4), pp. 697-709, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Sheng Zhong 0002, Fan Wu |
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007, pp. 278-289, 2007, ACM, 978-1-59593-681-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
routing, wireless ad hoc networks, collusion |
42 | Shan He 0002, Min Wu 0001 |
Collusion-Resistant video Fingerprinting for Large User Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2301-2304, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Darko Kirovski, Henrique S. Malvar, Yacov Yacobi |
Multimedia content screening using a dual watermarking and fingerprinting system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 10th ACM International Conference on Multimedia 2002, Juan les Pins, France, December 1-6, 2002., pp. 372-381, 2002, ACM, 1-58113-620-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii |
On the systematic generation of Tardos's fingerprinting codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: International Workshop on Multimedia Signal Processing, MMSP 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia, pp. 748-753, 2008, IEEE Signal Processing Society, 978-1-4244-2295-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 591-612, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
32 | Daniel Schonberg, Darko Kirovski |
Fingerprinting and forensic analysis of multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004, pp. 788-795, 2004, ACM, 1-58113-893-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
video, audio, fingerprinting, collusion attack, forensic analysis |
32 | Jeremy Horwitz, Ben Lynn |
Toward Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 466-481, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu |
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 22(9), pp. 1536-1549, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
symmetric key distribution protocols, Border gateway protocol, routing security, collusion resistance |
32 | Ramon Novales, Neeraj Mittal, Kamil Saraç |
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: Ninth International Symposium on Parallel and Distributed Computing, ISPDC 2010, Istanbul, Turkey, July 7-9, 2010, pp. 157-164, 2010, IEEE Computer Society, 978-0-7695-4120-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
confidential communication, symmetric key assignment, key pre-distribution, collusion resistance |
32 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Trans. Data Hiding Multim. Secur. 2, pp. 1-34, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking |
32 | Radu Jurca, Boi Faltings |
Collusion-resistant, incentive-compatible feedback payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), San Diego, California, USA, June 11-15, 2007, pp. 200-209, 2007, ACM, 978-1-59593-653-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mechanism design, incentive compatibility, reputation mechanisms, collusion resistance |
26 | Chen Yang, Wenping Ma 0002, Xinmei Wang |
Novel Remote User Authentication Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 306-312, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Biwen Chen, Tao Xiang 0001, Xiaoguo Li, Mingwu Zhang, Debiao He |
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(6), pp. 7844-7856, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jun Kurihara, Toshiaki Tanaka, Takeshi Kubo |
μODNS: A distributed approach to DNS anonymization with collusion resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 237, pp. 110078, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sarasij Maitra, David J. Wu 0001 |
Traceable PRFs: Full Collusion Resistance and Active Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I, pp. 439-469, 2022, Springer, 978-3-030-97120-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Sarasij Maitra, David J. Wu 0001 |
Traceable PRFs: Full Collusion Resistance and Active Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1675, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
25 | Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum |
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(15), pp. 5096, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | N. Rajkumar, E. Kannan |
Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 29(2), pp. 2030001:1-2030001:17, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed |
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.08538, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Liehuang Zhu, Meng Li 0006, Zijian Zhang 0001 |
Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 6(3), pp. 5473-5484, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Kai Li, Dong Hao |
Cooperation Enforcement and Collusion Resistance in Repeated Public Goods Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019., pp. 2085-2092, 2019, AAAI Press, 978-1-57735-809-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Kai Li, Dong Hao |
Cooperation Enforcement and Collusion Resistance in Repeated Public Goods Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.06126, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001 |
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 982, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Shuichi Katsumata, Shota Yamada 0001 |
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 914, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Alex Davidson, Ryo Nishimaki |
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 890, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Xinjiang Sun, Xiaobei Wu, Cheng Huang, Zhiliang Xu, Jianlin Zhong |
Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 37, pp. 324-336, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Alaa El-Din Mohamed, Reham Mostafa, Hamdy K. Elminir |
A novel JFD scheme for DRM systems based on DWT and collusion resistance fingerprint encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 13(6A), pp. 842-850, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Baiyu Li, Daniele Micciancio |
Compactness vs Collusion Resistance in Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 561, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Baiyu Li, Daniele Micciancio |
Compactness vs Collusion Resistance in Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (B2) ![In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, pp. 443-468, 2016, 978-3-662-53643-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | David Megías 0001, Amna Qureshi |
Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IH&MMSec ![In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016, pp. 181-182, 2016, ACM, 978-1-4503-4290-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Rong Jiang 0001, Rongxing Lu, Jun Luo 0011, Chengzhe Lai, Xuemin Sherman Shen |
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(6), pp. 1026-1039, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen |
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (2) ![In: Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II, pp. 163-182, 2015, Springer, 978-3-319-27121-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Yang Wang 0074, Willy Susilo, Man Ho Au, Guilin Wang |
Collusion-Resistance in Optimistic Fair Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 9(8), pp. 1227-1239, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Felix Günther 0001, Mark Manulis, Andreas Peter |
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 382, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Felix Günther 0001, Mark Manulis, Andreas Peter |
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 321-336, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Zhichao Zhu, Guohong Cao |
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 12(1), pp. 51-64, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Qiuhua Wang, Huifang Chen, Lei Xie 0003, Kuang Wang |
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 11(8), pp. 2500-2511, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Rong Jiang 0001, Rongxing Lu, Chengzhe Lai, Jun Luo 0011, Xuemin Shen |
Robust group key management with revocation and collusion resistance for SCADA in smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, December 9-13, 2013, pp. 802-807, 2013, IEEE, 978-1-4799-1353-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Yu-Chih Wei, Yi-Ming Chen 0008 |
Evaluation of collusion resistance on trust management systems for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITST ![In: 12th International Conference on ITS Telecommunications, ITST 2012, Taipei, Taiwan, November 5-8, 2012, pp. 356-360, 2012, IEEE, 978-1-4673-3071-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Xi Chen 0037, Shiguo Lian |
On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Multim. ![In: J. Multim. 6(4), pp. 369-375, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Jun Shao 0001, Zhenfu Cao, Peng Liu 0005 |
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(2), pp. 122-135, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Ratna Dutta, Sourav Mukhopadhyay, Tom Dowling |
Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain - October 28-29, 2009, pp. 80-87, 2009, ACM, 978-1-60558-619-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek |
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 328, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Ting Yuan, Jianqing Ma, YiPing Zhong, Shiyong Zhang |
Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: International Multisymposiums on Computer and Computational Sciences, IMSCCS 2008, Shanghai, China, October 18-20, 2008, pp. 83-90, 2008, IEEE Computer Society, 978-0-7695-3430-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Iman Saleh 0002, Mohamed Eltoweissy |
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 2(2), pp. 1-12, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
25 | Shan He 0002, Min Wu 0001 |
Improving collusion resistance of error correcting code based multimedia fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP (2) ![In: 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '05, Philadelphia, Pennsylvania, USA, March 18-23, 2005, pp. 1029-1032, 2005, IEEE, 0-7803-8874-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | H. Vicky Zhao, K. J. Ray Liu |
Fingerprint multicast in secure video streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(1), pp. 12-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong |
Secret Handshakes from Pairing-Based Key Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 180-196, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Craig Gentry, Alice Silverberg |
Hierarchical ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 548-566, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography |