Fingerprinting techniques for field-programmable gate arrayintellectual property protection
暂无分享,去创建一个
Miodrag Potkonjak | William H. Mangione-Smith | John Lach | J. Lach | W. Mangione-Smith | M. Potkonjak
[1] Miodrag Potkonjak,et al. Low overhead fault-tolerant FPGA systems , 1998, IEEE Trans. Very Large Scale Integr. Syst..
[2] Arlindo L. Oliveira. Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.
[3] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[4] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[5] Bernd Meyer,et al. Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.
[6] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[7] Steve Furber,et al. ARM System Architecture , 1996 .
[8] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[9] Edoardo Charbon. Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[10] R. S. Fabry,et al. A fast file system for UNIX , 1984, TOCS.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[13] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[14] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[15] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[16] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[17] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[18] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[19] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[20] I. Torunoglu,et al. Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.
[21] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[22] Miodrag Potkonjak,et al. Effective iterative techniques for fingerprinting design IP [VLSI CAD] , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).
[23] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[24] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[25] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[26] Richard T. Witek,et al. A 160 MHz 32 b 0.5 W CMOS RISC microprocessor , 1996, 1996 IEEE International Solid-State Circuits Conference. Digest of TEchnical Papers, ISSCC.
[27] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[28] Miodrag Potkonjak,et al. Signature hiding techniques for FPGA intellectual property protection , 1998, ICCAD '98.
[29] Miodrag Potkonjak,et al. Signature hiding techniques for FPGA intellectual property protection , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).