Towards multilateral secure digital rights distribution infrastructures
暂无分享,去创建一个
[1] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[3] Susanne Guth. Rights Expression Languages , 2003, Digital Rights Management.
[4] Jaap A. Haitsma,et al. Robust Audio Hashing for Content Identification , 2001 .
[5] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[6] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[7] Bernd Girod,et al. Asymmetric Watermarking Schemes , 2000 .
[8] Ahmad-Reza Sadeghi,et al. Overcoming the obstacles of zero-knowledge watermark detection , 2004, MM&Sec '04.
[9] H. Wang,et al. A signature for content-based image retrieval using a geometrical transform , 1998, MULTIMEDIA '98.
[10] Ahmad-Reza Sadeghi,et al. Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.
[11] Matthias Schunter,et al. Optimistic fair exchange , 2000 .
[12] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[13] William E. Johnston,et al. Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.
[14] Ahmad-Reza Sadeghi,et al. Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it , 2005, Multimedia Systems.
[15] White-Box Cryptography. for Digital Content Protection , 2005 .
[16] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[17] Matthew K. Franklin,et al. Distribution chain security , 2000, CCS.
[18] Pierangela Samarati,et al. Proceedings of the 8th ACM conference on Computer and Communications Security , 1998, CCS 2001.
[19] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[20] Antonio Maña,et al. EC-GATE : AN INFRASTRUCTURE FOR DRM , 2003 .
[21] Ee-Chien Chang,et al. Watermarking with retrieval systems , 2004, Multimedia Systems.
[22] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[23] Jan Vitek,et al. Secure Internet Programming , 1999 .
[24] Ahmad-Reza Sadeghi,et al. Proving Ownership of Digital Content , 1999, Information Hiding.
[25] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[26] Michiharu Kudo,et al. XML document security based on provisional authorization , 2000, CCS.
[27] Steve Mitchell,et al. The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.
[28] Andreas Uhl,et al. Robust Visual Hashing Using JPEG 2000 , 2004, Communications and Multimedia Security.
[29] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.