The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for collusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1998 (15) 1999-2001 (31) 2002 (26) 2003 (52) 2004 (39) 2005 (87) 2006 (89) 2007 (87) 2008 (86) 2009 (78) 2010 (49) 2011 (46) 2012 (34) 2013 (40) 2014 (41) 2015 (28) 2016 (63) 2017 (45) 2018 (48) 2019 (46) 2020 (65) 2021 (59) 2022 (64) 2023 (74) 2024 (21)
Publication types (Num. hits)
article(544) incollection(5) inproceedings(757) phdthesis(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 491 occurrences of 278 keywords

Results
Found 1313 publication records. Showing 1313 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
34Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Zhide Chen, Li Xu 0002 Anti-Collusion Anonymous Credentials Scheme. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Zhongxuan Liu, Shiguo Lian, Ronggang Wang, Zhen Ren Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Parisa Tabriz, Nikita Borisov Breaking the Collusion Detection Mechanism of MorphMix. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Zhongxuan Liu, Shiguo Lian, Zhen Ren Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Jie Yang, Xiaoxia Xu A Robust Anti-collusion Coding in Digital Fingerprinting System. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Yinian Mao, Mehmet Kivanç Mihçak Collusion-resistant intentional de-synchronization for digital video fingerprinting. Search on Bibsonomy ICIP (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Roumen Vragov Implicit Consumer Collusion in Auctions on the Internet. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Vincent Conitzer, Tuomas Sandholm Revenue Failures and Collusion in Combinatorial Auctions and Exchanges with VCG Payments. Search on Bibsonomy AMEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Basit Qureshi, Geyong Min, Demetres D. Kouvatsos Collusion Detection and Prevention with FIRE+ Trust and Reputation Model. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Collusion detection, FIRE reputation model, disconnected MANETs, trust management
32Qiaoliang Li, Xiaoming Wang 0001, Yingshu Li, Yi Pan 0001, Pingzhi Fan Construction of Anti-Collusion Codes Based on Cover-Free Families. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anti-collusion codes, Reed-Solomon codes, cover-free families
32Yan Zhu 0010, Wei Zou, Xinshan Zhu Collusion secure convolutional fingerprinting information codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collusion security, tracing traitor, convolutional code, digital fingerprinting
32Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas Collusion-Resistant Video Watermarking Based on Video Mosaicing. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF video watermarking, collusion attack, video mosaicing
32Vincent Conitzer, Tuomas Sandholm Revenue failures and collusion in combinatorial auctions and exchanges with vcg payments. Search on Bibsonomy EC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF combinatorial auctions, collusion, vcg mechanism
30Olufunmilola Oladunni Onolaja, Rami Bahsoon, Georgios Theodoropoulos 0001 An Architecture for Dynamic Trust Monitoring in Mobile Networks. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Boris Skoric, Stefan Katzenbeisser 0001, Mehmet Utku Celik Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94B60
30Yu Zhang, Zang Li, Wade Trappe Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Zhongxuan Liu, Shiguo Lian, Yuan Dong, Haila Wang Desynchronized image fingerprint for large scale distribution. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, S. Rao Jammalamadaka Towards Reliable Reputations for Dynamic Networked Systems. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Qingfeng Chen, Shichao Zhang 0001, Yi-Ping Phoebe Chen Identifying Dependency Between Secure Messages for Protocol Analysis. Search on Bibsonomy KSEM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang Joint Fingerprint Embedding and Decryption for Video Distribution. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Cristiano P. Costa, Jussara M. Almeida Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30H. Vicky Zhao, K. J. Ray Liu Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Udit Budhia, Deepa Kundur, Takis Zourntos Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu Scalable Multimedia Fingerprinting Forensics with Side Information. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Suphithat Songsiri A New Approach for Computation Result Protection in the Mobile Agent Paradigm. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Jae-Min Seol, Seong-Whan Kim A Scalable Fingerprinting Scheme for Tracing Traitors/Colluders in Large Scale Contents Distribution Environments. Search on Bibsonomy ISDA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Chao-Yong Hsu, Chun-Shien Lu Near-perfect cover image recovery anti-multiple watermark embedding approaches. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Claudiu Duma, Nahid Shahmehri, Patrick Lambrix A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Jessica Staddon Dynamic inference control. Search on Bibsonomy DMKD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Darko Kirovski, Henrique S. Malvar, Yacov Yacobi Multimedia content screening using a dual watermarking and fingerprinting system. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Stefano Colombo Product Differentiation and Collusion Sustainability When Collusion Is Costly. Search on Bibsonomy Mark. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Cesarino Bertini, Gianfranco Gambarelli, Angelo Uristani Indices of Collusion among Judges and an Anti-collusion Average. Search on Bibsonomy Preferences and Decisions The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Yongdong Wu Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. Search on Bibsonomy ICASSP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Malay Bhattacharyya 0001, Sanghamitra Bandyopadhyay Solving maximum fuzzy clique problem with neural networks and its applications. Search on Bibsonomy Memetic Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Maximum fuzzy clique problem, Stock flow graph, Collusion set, Neural networks, Fuzzy logic, Gene expression
27Jing Chen 0017, Silvio Micali A new approach to auctions and resilient mechanism design. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF collusion-resilient auctions, implementation in surviving strategies, player-knowledge benchmarks, resilient mechanism design, combinatorial auctions
27Sarah N. Lim Choi Keung, Nathan Griffiths Networking for multi-agents: beyond a local view. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF trust, reputation, relationships, agent systems, collusion
27Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy Explanation-aware service selection: rationale and reputation. Search on Bibsonomy Serv. Oriented Comput. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion detection, Web services, Reputation, Recommendation, Explanation, Rationale, Deception detection
27Jong Hwan Park, Dong Hoon Lee 0001 A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public Key Broadcast Encryption, Full Collusion-Security
27Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
27Xiaosong Lou, Kai Hwang 0001, Runfang Zhou Integrated Copyright Protection in Peer-to-Peer Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet content delivery systems, peer collusion, content poisoning, reputation systems and digital right management, Peer-to-Peer systems
27Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design
27Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
27Emmanuelle Anceaume, Aina Ravoaja Incentive-Based Robust Reputation Mechanism for P2P Services. Search on Bibsonomy OPODIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reputation, peer-to-peer systems, credibility, free-riding, collusion
27Yang Bo, Wang Qin An efficient traitor tracing scheme based on MDS code. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traitor tracing, collusion-resistant, MDS code
27Yingjiu Li, Vipin Swarup, Sushil Jajodia Fingerprinting Relational Databases: Schemes and Specialties. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF robustness, relational database, Fingerprint, collusion attack
27Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg On the cost-ineffectiveness of redundancy in commercial P2P computing. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF game theory, redundancy, P2P computing, collusion
27Junghyun Nam, Seungjoo Kim, Dongho Won Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Group key agreement, collusion attack, key authentication
27Michal Feldman, Kevin Lai, Ion Stoica, John Chuang Robust incentive techniques for peer-to-peer networks. Search on Bibsonomy EC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cheap pseudonyms, prisoners dilemma, whitewash, peer-to-peer, reputation, incentives, free-riding, collusion
27Xun Yi, Yiming Ye Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Access control, RSA, collusion attack, key assignment
27Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
27Tri Van Le, Mike Burmester, Jiangyi Hu Short c-Secure Fingerprinting Codes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF collusion secure, Fingerprinting, copyright protection
27Francesc Sebé, Josep Domingo-Ferrer Short 3-Secure Fingerprinting Codes for Copyright Protection. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting
24Amjed Shareef Brief announcement: collusion free protocol for rational secret sharing. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF rational cryptography
24Emad Eldin Mohamed, Hussein M. Abdel-Wahab Collusion-Resistant Message Authentication in Overlay Multicast Communication. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multicast communication, Message authentication, Overlay multicast, Multicast security
24Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Tobias Harks Stackelberg Strategies and Collusion in Network Games with Splittable Flow. Search on Bibsonomy WAOA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Emmanuelle Anceaume, Romaric Ludinard, Aina Ravoaja, Francisco Vilar Brasileiro PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Oktay Altun, Gaurav Sharma 0001, Adem Orsdemir, Mark F. Bocko Collusion Resilient Fingerprint Design by Alternating Projections. Search on Bibsonomy ICIP (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Pietro Lungaro Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dragos Trinca, Sanguthevar Rajasekaran Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yongdong Wu Nonlinear collusion attack on a watermarking scheme for buyer authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Brent Waters A fully collusion resistant broadcast, trace, and revoke system. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Amit Sahai, Brent Waters Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ching-Nung Yang, Bing-Ling Lu Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Amir Houman Sadr, Shahrokh Ghaemmaghami A Collusion-Resistant Video Watermarking Scheme. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Andrew V. Goldberg, Jason D. Hartline Collusion-resistant mechanisms for single-parameter agents. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
24Nadia Baaziz, Yamina Sami Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. Search on Bibsonomy DFMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Roberto Caldelli, Alessandro Piva, Mauro Barni, Andrea Carboni Effectiveness of ST-DM Watermarking Against Intra-video Collusion. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Kotaro Sonoda, Ryouichi Nishimura, Yôiti Suzuki Audio CoFIP (Contents Fingerprinting) Robust Against Collusion Attack. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Craig Gentry, Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Hongmei Gou, Min Wu 0001 Data hiding in curves for collusion-resistant digital fingerprinting. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Gang Li, Jie Yang 0002 Research on the Collusion Estimation. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Karen Su, Deepa Kundur, Dimitrios Hatzinakos A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks. Search on Bibsonomy ICIP (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Francis Zane Efficient Watermark Detection and Collusion Security. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Ingrid Biehl, Bernd Meyer 0002 Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract). Search on Bibsonomy STACS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Dan Boneh, James Shaw Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Mikhail J. Atallah, Keith B. Frikken Securely outsourcing linear algebra computations. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computational outsourcing, privacy, cryptographic protocols
20Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baihua Zheng Navigational path privacy protection: navigational path privacy protection. Search on Bibsonomy CIKM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy protection, road network, path search
20Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon Assessing the trustworthiness of location data based on provenance. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF location data, trustworthiness
20Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu Fairness dynamics in multimedia colluders' social networks. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Dan Boneh, Moni Naor Traitor tracing with constant size ciphertext. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, traitor tracing, fingerprinting codes
20Qingyu Xu, Mingxing He, Lein Harn An Improved Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Shwu-Huey Yen, Hsiao-Wei Chang, Chia-Jen Wang, Patrick S. P. Wang, Mei-Chueh Chang A scene-based video watermarking technique using SVMs. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Jinsong Gui, Xiaoheng Deng An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii On the systematic generation of Tardos's fingerprinting codes. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Thomas Bocek, Kun Wang, Fabio Victora Hecht, David Hausheer, Burkhard Stiller PSH: A Private and Shared History-Based Incentive Mechanism. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Jianli Hu, Quanyuan Wu, Bin Zhou 0004 Distributed and Effective Reputation Mechanism in P2P Systems. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Server-Aided Verification Signatures: Definitions and New Constructions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Server-aided computation, server-aided verification, BLS, ZSS, untrusted server, random oracle
20Teddy Furon, Arnaud Guyader, Frédéric Cérou On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Minoru Kuribayashi, Masakatu Morii Iterative Detection Method for CDMA-Based Fingerprinting Scheme. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20C.-S. Lu, C.-Y. Hsu Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Wen-Chung Kuo Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation". Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Zhongxuan Liu, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, Haila Wang Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Chen Yang, Wenping Ma 0002, Xinmei Wang Novel Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Jin-Heung Lee, Tea-Hun Lim, Keon-Woo Kim, Sang-Uk Shin A New Fingerprinting Codes for Multimedia Contents. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Watermarking for Fingerprinting Code, Trace, Copyrights Protection, Digital Fingerprinting
20Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group
Displaying result #101 - #200 of 1313 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license