Anonymous Fingerprinting
暂无分享,去创建一个
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[3] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[4] J.L. Massey,et al. Theory and practice of error control codes , 1986, Proceedings of the IEEE.
[5] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[6] Moti Yung,et al. Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract) , 1990, CRYPTO.
[7] Andreas Pfitzmann,et al. Value exchange systems enabling security and unobservability , 1990, Comput. Secur..
[8] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[9] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[10] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[11] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[12] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[13] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.
[14] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[15] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[16] Birgit Pfitzmann,et al. Asymmetric fingerprinting for larger collusions , 1997, CCS '97.
[17] Bernd Meyer,et al. Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.
[18] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.