Framework for preserving security and privacy in peer-to-peer content distribution systems
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[2] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[3] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[4] Henning Pagnia,et al. On the Impossibility of Fair Exchange without a Trusted Third Party , 1999 .
[5] Hideki Imai,et al. An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.
[6] Sridhar Krishnan,et al. A Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing , 2010, IEEE Transactions on Information Forensics and Security.
[7] Jongsung Kim,et al. Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents , 2011, Wirel. Pers. Commun..
[8] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[9] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[10] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[11] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[12] Raphael C.-W. Phan,et al. An authentication framework for peer-to-peer cloud , 2013, SIN.
[13] David Megías,et al. High capacity audio watermarking using the high frequency band of the wavelet domain , 2010, Multimedia Tools and Applications.
[14] Dimitris Kanellopoulos,et al. Recent Advances in Multimedia Information System Security , 2009, Informatica.
[15] Birgit Pfitzmann,et al. Asymmetric fingerprinting , 1996 .
[16] Yunhao Liu,et al. Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps , 2008, IEEE Transactions on Parallel and Distributed Systems.
[17] Kouichi Sakurai,et al. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.
[18] Sviatoslav Voloshynovskiy,et al. Active content fingerprinting: A marriage of digital watermarking and content fingerprinting , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[19] Andrea Passarella,et al. A survey on content-centric technologies for the current Internet: CDN and P2P solutions , 2012, Comput. Commun..
[20] M. B. Chandak,et al. KEY FRAME EXTRACTION METHODOLOGY FOR VIDEO ANNOTATION , 2013 .
[21] José Luis García-Dorado,et al. Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact , 2012, IEEE Transactions on Network and Service Management.
[22] Jan Camenisch. Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.
[23] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[24] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[25] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[26] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[27] Bart Preneel,et al. On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[28] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[29] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[30] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[31] Josep Domingo-Ferrer,et al. Short collusion-secure fingerprints based on dual binary Hamming codes , 2000 .
[32] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[33] Josep Domingo-Ferrer,et al. Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints , 2013, Multimedia Systems.
[34] Jung-Shian Li,et al. A novel DRM framework for peer-to-peer music content delivery , 2010, J. Syst. Softw..
[35] Alessandro Piva,et al. A Provably Secure Anonymous Buyer–Seller Watermarking Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[36] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[37] Fred von Lohmann. Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers , 2003, IPTPS.
[38] Josep Domingo-Ferrer,et al. Practical asymmetric fingerprinting with a TTP , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[39] Jian Cao,et al. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security , 2012, IEEE Transactions on Information Forensics and Security.
[40] Kai Hwang,et al. Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.
[41] Josep Domingo-Ferrer,et al. Distributed multicast of fingerprinted content based on a rational peer-to-peer community , 2013, Comput. Commun..
[42] Jose L. Muñoz,et al. Surework: a super-peer reputation framework for p2p networks , 2008, SAC '08.
[43] Alessandro Piva,et al. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.
[44] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[45] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[46] Zekeriya Erkin,et al. Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..