Watermill: An Optimized Fingerprinting System for Databases under Constraints
暂无分享,去创建一个
Camélia Constantin | David Gross-Amblard | Julien Lafaye | Meryem Guerrouani | Julien Lafaye | David Gross-Amblard | Camélia Constantin | Meryem Guerrouani | D. Gross-Amblard
[1] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[2] G. Nemhauser,et al. Integer Programming , 2020 .
[3] Jeffrey D. Uuman. Principles of database and knowledge- base systems , 1989 .
[4] R. L. Fountain,et al. The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[5] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[6] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[7] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[8] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[9] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[10] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[11] Wenfei Fan,et al. Integrity constraints for XML , 2000, PODS.
[12] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[13] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[14] Sushil Jajodia,et al. Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.
[15] Wenfei Fan,et al. Integrity constraints for XML , 2003, J. Comput. Syst. Sci..
[16] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[17] Radu Sion,et al. Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..
[18] Davide Martinenghi. Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins , 2004, FQAS.
[19] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[20] Hans Georg Schaathun,et al. The Boneh-Shaw fingerprinting scheme is better than we thought , 2006, IEEE Transactions on Information Forensics and Security.
[21] G. Tardos. Optimal probabilistic fingerprint codes , 2008, JACM.
[22] Elisa Bertino,et al. Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.