|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 254 occurrences of 151 keywords
|
|
|
Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Rudolf Ahlswede, Ning Cai 0001 |
Codes with the Identifiable Parent Property and the Multiple-Access Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GTIT-C ![In: General Theory of Information Transfer and Combinatorics, pp. 249-257, 2006, Springer, 3-540-46244-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yizhou Ma, Chang-hui Choe, Moon Ho Lee |
A Class of Traceability Codes with an Efficient Tracing Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 63, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Traceability Codes, List Decoding Algorithm, Reed-Solomon codes, Traitor Tracing |
12 | Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi |
Opaque Predicates Detection by Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology, 11th International Conference, AMAST 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings, pp. 81-95, 2006, Springer, 3-540-35633-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Ickjai Lee, Hossein Ghodosi |
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 159-160, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | WenYuan Jen, Weiping Chang, Shihchieh Chou |
Cybercrime in Taiwan - An Analysis of Suspect Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 38-48, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Zoltán Nochta, Thorsten Staake, Elgar Fleisch |
Product Specific Security Features Based on RFID Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2006 International Symposium on Applications and the Internet Workshops (SAINT 2006 Workshops), 23-27 January 2006, Phoenix, Arizona, USA, pp. 72-75, 2006, IEEE Computer Society, 0-7695-2510-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Marc Fetscherin |
Economics of online music and consumer behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 599-604, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
online music, digital rights management, consumer behavior |
12 | Chih-Chieh Liu, Yu-Feng Kuo, Chun-Hsiang Huang, Ja-Ling Wu |
A Colorization Based Animation Broadcast System with Traitor Tracing Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 387-396, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
animation broadcasting, colorization, traitor tracing |
12 | William Zhu 0001, Clark D. Thomborson |
Extraction in software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 175-181, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embed, security, graph, extract, software watermark, interference graph |
12 | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen |
Rights Protection for Data Cubes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 359-372, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Hongxia Jin, Jeffery Lotspiech |
Hybrid Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1329-1332, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano |
A Practical Solution for Distribution Rights Protection in Multicast Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 527-536, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Qutaiba Albluwi, Ibrahim Kamel |
Watermarking Essential Data Structures for Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 241-258, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yang Bo, Wang Qin |
An efficient traitor tracing scheme based on MDS code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 34, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traitor tracing, collusion-resistant, MDS code |
12 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 63, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
12 | Milind Engedy, Munaga V. N. K. Prasad, Ashutosh Saxena |
A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: First IEEE International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings, pp. 36-40, 2006, IEEE, 1-4244-0682-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tamir Tassa |
Low Bandwidth Dynamic Traitor Tracing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 18(2), pp. 167-183, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Watermarking, Fingerprinting, On-line algorithms, Broadcast encryption, Traitor tracing, Binary codes, Pay-TV |
12 | Kemal Altinkemer, Junwei Guan, Aysegül Sahin |
Online software distribution without enforcing copy protection as a strategic weapon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 3(4), pp. 343-361, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung |
Scalable public-key tracing and revoking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 17(4), pp. 323-347, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing |
12 | Jun Yang 0002, Lan Gao, Youtao Zhang |
Improving Memory Encryption Performance in Secure Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(5), pp. 630-640, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
hardware/software protection, security and protection, Memory design |
12 | Thorsten Staake, Frédéric Thiesse, Elgar Fleisch |
Extending the EPC network: the potential of RFID in anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1607-1612, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
track & trace, authentication, RFID, counterfeiting |
12 | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
A Traitor Tracing Scheme Based on RSA for Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 56-74, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Silvia Llorente, Jaime Delgado, Eva Rodríguez, Rubén Barrio, Isabella Longo, Franco Bixio |
Generation of Standardised Rights Expressions from Contracts: An Ontology Approach? ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, GADA, MIOS+INTEROP, ORM, PhDS, SeBGIS, SWWS, and WOSE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, pp. 836-845, 2005, Springer, 3-540-29739-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Stefan Savage |
Scalable internet threat monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005, pp. 71, 2005, ACM Press, 1-59593-229-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jun Sang, Mohammad S. Alam |
A Neural Network Based Lossless Digital Image Watermarking in the Spatial Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, pp. 772-776, 2005, Springer, 3-540-25913-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 148-162, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
12 | Xiaoming Jin, Zhihao Zhang, Jianmin Wang 0001, Deyi Li |
Watermarking Spatial Trajectory Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 10th International Conference, DASFAA 2005, Beijing, China, April 17-20, 2005, Proceedings, pp. 56-67, 2005, Springer, 3-540-25334-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
spatial trajectory, Digital watermarks, database security |
12 | Hongxia Jin, Jeffery Lotspiech |
Flexible Traitor Tracing for Anonymous Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 269-270, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Balaji Venkatachalam |
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 299-312, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere |
Software Protection Through Dynamic Code Mutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 194-206, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 37-45, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
12 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
Tracing Traitors by Guessing Secrets. The q-Ary Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 61-73, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | William Zhu 0001, Clark D. Thomborson |
Algorithms to Watermark Software Through Register Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 180-191, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
Practical Scenarios for the Van Trung-Martirosyan Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 624-633, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | William Zhu 0001, Clark D. Thomborson |
On the QP Algorithm in Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 646-647, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Vural Ünlü, Thomas Hess |
The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 512-517, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Tran van Trung, Sosina Martirosyan |
On a Class of Traceability Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 31(2), pp. 125-132, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
traceability code, q-ary code, mutually orthogonal latin squares |
12 | Newton Lee |
Welcome. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 2(2), pp. 1, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | David Koller, Michael Turitzin, Marc Levoy, Marco Tarini, Giuseppe Croccia, Paolo Cignoni, Roberto Scopigno |
Protected interactive 3D graphics via remote rendering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 23(3), pp. 695-703, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, 3D models, digital rights management, remote rendering |
12 | Joseph Zambreno, Rahul Simha, Alok N. Choudhary |
Addressing application integrity attacks using a reconfigurable architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, FPGA 2004, Monterey, California, USA, February 22-24, 2004, pp. 250, 2004, ACM, 1-58113-829-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Silvia Llorente, Eva Rodríguez, Jaime Delgado |
Workflow Description of Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, GADA, JTRES, MIOS, WORM, WOSE, PhDS, and INTEROP 2004, Agia Napa, Cyprus, October 25-29, 2004. Proceedings, pp. 581-592, 2004, Springer, 3-540-23664-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | William Ku, Chi-Hung Chi |
Survey on the Technological Aspects of Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 391-403, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Sakuna Vanichvisuttikul, Chamnong Jungthirapanich |
The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 68-75, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Marcel Fernandez, Miguel Soriano |
Identification Algorithms for Sequential Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 414-430, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Magali Dubosson-Torbay, Yves Pigneur, Jean-Claude Usunier |
Business Models for Music Distribution after the P2P Revolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEDELMUSIC ![In: 4th International Conference on WEB Delivering of Music (WEDELMUSIC 2004), 13-15 September 2004, Barcelona, Spain, pp. 172-179, 2004, IEEE Computer Society, 0-7695-2157-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Support for multi-level security policies in DRM architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pp. 3-9, 2004, ACM, 1-59593-076-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ahmet M. Eskicioglu |
Protecting Intellectual Property in Digital Multimedia Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(7), pp. 39-45, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Christian S. Collberg, Ginger Myles, Andrew Huntwork |
Sandmark--A Tool for Software Protection Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(4), pp. 40-49, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Rakesh Agrawal 0001, Peter J. Haas, Jerry Kiernan |
Watermarking relational data: framework, algorithms and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 12(2), pp. 157-169, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Database, Watermarking, Steganography, Information hiding |
12 | Cullen Linn, Saumya K. Debray |
Obfuscation of executable code to improve resistance to static disassembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 290-299, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
disassembly, code obfuscation |
12 | Xiangyu Zhang 0001, Rajiv Gupta 0001 |
Hiding Program Slices for Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 23-26 March 2003, San Francisco, CA, USA, pp. 325-336, 2003, IEEE Computer Society, 0-7695-1913-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung |
Scalable public-key tracing and revoking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003, pp. 190-199, 2003, ACM, 1-58113-708-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing |
12 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 225-235, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Christian S. Collberg, Clark D. Thomborson |
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 28(8), pp. 735-746, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
watermarking, Obfuscation, intellectual property protection, tamper-proofing |
12 | Darko Kirovski, Fabien A. P. Petitcolas |
Replacement Attack on Arbitrary Watermarking Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 177-189, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Brian K. Hart |
Electronic delivery of software: implementation of a robust, effective solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 177-178, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web-enabled applications, software, development, licensing, delivery |
12 | Dylan Carline, Paul Coulton |
Internet Authentication of LUT-Based FPGA Configuration Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Configuration Files, FPGA, Authentication, Bitstream |
12 | Scott Moskowitz |
What is Acceptable Quality in the Application of Digital Watermarking: Trade-offs of Security, Robustness and Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 80-84, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Tadayoshi Kohno, Mark McGovern |
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 70-81, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
risk management, content distribution, copy-protection, PMI |
12 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001, pp. 85-94, 2001, ACM, 1-58113-387-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Jill Gerhardt-Powals, Matthew H. Powals |
Distance education: law attempts to catch up with technology (battle between copyright owners and academics). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2000, Austin, Texas, USA, March 7-12, 2000, pp. 335-342, 2000, ACM, 1-58113-213-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Sung-Min Lee 0006, Hyung-Woo Lee, Tai-Yun Kim |
A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings, pp. 63-71, 2000, Springer, 3-540-67981-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 333-352, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Tomas Sander, Christian F. Tschudin |
On Software Protection via Function Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 111-123, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Karl Dakin |
Do You Know What Your License Allows? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 12(3), pp. 82-83, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
12 | Galen B. Crow |
Defining educational policy on software usage in the light of copyright law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 20th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1989, Louisville, Kentucky, USA, February 23-24, 1989, pp. 47-51, 1989, ACM, 978-0-89791-298-3. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
12 | Jean-Jacques Quisquater, André Bouckaert |
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 662-664, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
12 | Mark B. Johnson |
You cannot lead a horse to water: taking charge of microcomputer support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 15th Annual ACM SIGUCCS Conference on User Services, Kansas City, Missouri, USA, 1987, pp. 67-71, 1987, ACM, 0-89791-241-1. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
12 | Ingrid Schaumüller-Bichl, Ernst Piller |
A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 446-454, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #669 of 669 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|