Tracing Mobile Database with Complex Watermark
暂无分享,去创建一个
[1] Xiaodong Wang,et al. How to Dynamically Protect Data in Mobile Cloud Computing? , 2012, ICPCA/SWS.
[2] Shampa Chakraverty,et al. Watermarking relational databases using bacterial foraging algorithm , 2013, Multimedia Tools and Applications.
[3] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[4] Haixia Mao,et al. A Survey of Mobile Cloud Computing , 2011 .
[5] Sanjeev Khanna,et al. Watermarking maps: hiding information in structured data , 2000, SODA '00.
[6] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[7] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[8] Zhi-Fang Yang,et al. Watermark design based on Steiner triple systems , 2013, Multimedia Tools and Applications.
[9] Agostino Cortesi,et al. Distortion-Free Authentication Watermarking , 2010, ICSOFT.
[10] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[11] Radu Sion,et al. Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..