Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("collusion resistance")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 14 of 14

  • Page / 1
Export

Selection :

  • and

Anti-collusive self-healing key distributions for wireless networksDUTTA, Ratna.International journal of wireless and mobile computing (Print). 2014, Vol 7, Num 4, pp 362-377, issn 1741-1084, 16 p.Article

Anti-collusion forensics of multimedia fingerprinting using orthogonal modulationWANG, Z. Jane; MIN WU; ZHAO, Hong Vicky et al.IEEE transactions on image processing. 2005, Vol 14, Num 6, pp 804-821, issn 1057-7149, 18 p.Article

Digital fingerprinting: problems and solutionsDEFA HU; JUANJUAN LUO.International journal of information and computer security (Print). 2011, Vol 4, Num 4, pp 316-331, issn 1744-1765, 16 p.Article

Anti-collusion fingerprinting for multimediaTRAPPE, Wade; MIN WU; WANG, Z. Jane et al.IEEE transactions on signal processing. 2003, Vol 51, Num 4, pp 1069-1087, issn 1053-587X, 19 p.Article

Collusion-Resistant Repeated Double Auctions for Relay Assignment in Cooperative NetworksZICHUAN XU; WEIFA LIANG.IEEE transactions on wireless communications. 2014, Vol 13, Num 3, pp 1196-1207, issn 1536-1276, 12 p.Article

Cooperation in Wireless Networks with Unreliable ChannelsWENJING WANG; CHATTERJEE, Mainak; KWIAT, Kevin et al.IEEE transactions on communications. 2011, Vol 59, Num 10, pp 2808-2817, issn 0090-6778, 10 p.Article

Dynamic Tardos Traitor Tracing SchemesLAARHOVEN, Thijs; DOUMEN, Jeroen; ROELSE, Peter et al.IEEE transactions on information theory. 2013, Vol 59, Num 7, pp 4230-4242, issn 0018-9448, 13 p.Article

Collusion resistant self-healing key distribution in mobile wireless networksDUTTA, Ratna; SANYAL, Sugata.International journal of wireless and mobile computing (Print). 2012, Vol 5, Num 3, pp 228-243, issn 1741-1084, 16 p.Article

Privacy-aware peer-to-peer content distribution using automatically recombined fingerprintsMEGIAS, David; DOMINGO-FERRER, Josep.Multimedia systems. 2014, Vol 20, Num 2, pp 105-125, issn 0942-4962, 21 p.Article

LBAS: An effective pricing mechanism towards video migration in cloud-assisted VoD systemXIN CONG; KAI SHUANG; SEN SU et al.Computer networks (1999). 2014, Vol 64, pp 15-25, issn 1389-1286, 11 p.Article

A Scalable Collusion-Resistant Multi-Winner Cognitive Spectrum Auction GameYONGLE WU; BEIBEI WANG; LIU, K. J. Ray et al.IEEE transactions on communications. 2009, Vol 57, Num 12, pp 3805-3816, issn 0090-6778, 12 p.Article

SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networksNOVALES, Ramon L; MITTAL, Neeraj; SARAC, Kamil et al.Ad hoc networks. 2014, Vol 20, pp 163-181, issn 1570-8705, 19 p.Article

Data hiding in curves with application to fingerprinting mapsHONGMEI GOU; MIN WU.IEEE transactions on signal processing. 2005, Vol 53, Num 10, pp 3988-4005, issn 1053-587X, 18 p., 2Article

Framework for preserving security and privacy in peer-to-peer content distribution systemsQURESHI, Amna; MEGIAS, David; RIFA-POUS, Helena et al.Expert systems with applications. 2015, Vol 42, Num 3, pp 1391-1408, issn 0957-4174, 18 p.Article

  • Page / 1