How to Copyright a Function?
暂无分享,去创建一个
[1] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[2] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[3] John M. Acken,et al. How watermarking adds value to digital content , 1998, CACM.
[4] Jacques Stern,et al. A New Public-Key Cryptosystem , 1997, EUROCRYPT.
[5] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[6] Franck Davoine,et al. Self-similarity based image watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[9] Birgit Pfitzmann,et al. Asymmetric fingerprinting , 1996 .
[10] Gary L. Miller. Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..
[11] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[12] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[13] Michael J. Wise,et al. Plagiarism à la Mode: A Comparison of Automated Systems for Detecting Suspected Plagiarism , 1996, Comput. J..