A Provably Secure Anonymous Buyer-Seller
暂无分享,去创建一个
[1] Jan Camenisch. Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.
[2] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[3] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[4] Ahmad-Reza Sadeghi,et al. Proving Ownership of Digital Content , 1999, Information Hiding.
[5] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[6] Steve Kremer,et al. Formal analysis of optimistic fair exchange protocols , 2004 .
[7] Bernd Meyer,et al. Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.
[8] Jacques Stern,et al. Fair Encryption of RSA Keys , 2000, EUROCRYPT.
[9] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[10] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[11] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[12] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.
[13] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[14] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[15] Jun Zhang,et al. Secure buyer-seller watermarking protocol , 2006 .
[16] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[17] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[18] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[19] Lawrence O'Gorman,et al. Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..
[20] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.
[21] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[22] Derrick Grover,et al. The Protection of Computer Software: Its Technology and Application , 1992 .
[23] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[24] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.
[25] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[26] Ahmad-Reza Sadeghi,et al. Anonymous Fingerprinting with Direct Non-repudiation , 2000, ASIACRYPT.
[27] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[28] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[29] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.