Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("collusion attacks")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 15 of 15

  • Page / 1
Export

Selection :

  • and

Resistance of digital watermarks to collusive attacksKILIAN, J; LEIGHTON, F. T; MATHESON, L. R et al.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 271Conference Paper

Estimation of trustworthiness for P2P systems in a collusive attackSATO, Fumiaki.International journal of web and grid services (Print). 2008, Vol 4, Num 1, pp 24-34, issn 1741-1106, 11 p.Article

Further results on asymmetric authentication schemesJOHANSSON, T.Information and computation (Print). 1999, Vol 151, Num 1-2, pp 100-133, issn 0890-5401Article

Insight into collusion attacks in random-grid-based visual secret sharingLEE, Yao-Sheng; CHEN, Tzung-Her.Signal processing. 2012, Vol 92, Num 3, pp 727-736, issn 0165-1684, 10 p.Article

Authenticated public key broadcast encryption scheme secure against insiders' attackPARK, Chanil; HUR, Junbeom; HWANG, Seongoun et al.Mathematical and computer modelling. 2012, Vol 55, Num 1-2, pp 113-122, issn 0895-7177, 10 p.Article

Weakness of the synchro-difference LKH scheme for secure multicastKIM, Heeyoul; CHUNG, Byungchun; LEE, Younho et al.IEEE communications letters. 2007, Vol 11, Num 9, pp 765-767, issn 1089-7798, 3 p.Article

Anti-collusion forensics of multimedia fingerprinting using orthogonal modulationWANG, Z. Jane; MIN WU; ZHAO, Hong Vicky et al.IEEE transactions on image processing. 2005, Vol 14, Num 6, pp 804-821, issn 1057-7149, 18 p.Article

Fingerprinting With Equiangular Tight FramesMIXON, Dustin G; QUINN, Christopher J; KIYAVASH, Negar et al.IEEE transactions on information theory. 2013, Vol 59, Num 3, pp 1855-1865, issn 0018-9448, 11 p.Article

Dynamic combinatorial key management scheme for sensor networksMOHARRUM, Mohamed; ELTOWEISSY, Mohamed; MUKKAMALA, Ravi et al.Wireless communications and mobile computing (Print). 2006, Vol 6, Num 7, pp 1017-1035, issn 1530-8669, 19 p.Article

AACS-compatible multimedia joint encryption and fingerprinting : Security issues and some solutionsSUN, Shih-Wei; LU, Chun-Shien; CHANG, Pao-Chi et al.Signal processing. Image communication. 2008, Vol 23, Num 3, pp 179-193, issn 0923-5965, 15 p.Article

Optimal Probabilistic Fingerprint CodesTARDOS, Gabor.Journal of the Association for Computing Machinery. 2008, Vol 55, Num 2, issn 0004-5411, 10.1-10.24Article

Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting CodesYANG, Ching-Nung; LU, Bing-Ling.Journal of information science and engineering. 2009, Vol 25, Num 1, pp 1-10, issn 1016-2364, 10 p.Article

Near-optimal watermark estimation and its countermeasure : Anti disclosure watermark for multiple watermark embeddingLU, Chun-Shien; HSU, Chao-Yung.IEEE transactions on circuits and systems for video technology. 2007, Vol 17, Num 4, pp 454-467, issn 1051-8215, 14 p.Article

Collusion-Traceable Secure Multimedia Distribution Based on Controllable ModulationSHIGUO LIAN; ZHIQUAN WANG.IEEE transactions on circuits and systems for video technology. 2008, Vol 18, Num 10, pp 1462-1467, issn 1051-8215, 6 p.Article

One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networksQIUHUA WANG; HUIFANG CHEN; LEI XIE et al.Ad hoc networks. 2013, Vol 11, Num 8, pp 2500-2511, issn 1570-8705, 12 p.Article

  • Page / 1