Tamper-resistant storage techniques for multimedia systems
暂无分享,去创建一个
William Yurcik | Larry Brumbaugh | Joseph Tucek | Elizabeth Haubert | W. Yurcik | L. Brumbaugh | Joseph A. Tucek | Elizabeth Haubert
[1] F. Perez-Gonzalez,et al. A tutorial on digital watermarking , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[2] Michael K. Reiter,et al. Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[3] Erez Zadok,et al. Proceedings of the General Track: 2003 Usenix Annual Technical Conference Ncryptfs: a Secure and Convenient Cryptographic File System , 2022 .
[4] C.-C. Jay Kuo,et al. Robust EBCOT coding technique for wireless image transmission , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[5] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[7] Peter F. Corbett,et al. Row-Diagonal Parity for Double Disk Failure Correction (Awarded Best Paper!) , 2004, USENIX Conference on File and Storage Technologies.
[8] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[9] Stephen Wolthusen. On the Limitations of Digital Watermarks : A Cautionary Note , 2001 .
[10] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[11] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[12] John Kubiatowicz,et al. Naming and integrity: self-verifying data in peer-to-peer systems , 2003 .
[13] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[14] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).