A Generic Distortion Free Watermarking Technique for Relational Databases
暂无分享,去创建一个
[1] Patrick Cousot,et al. Abstract Interpretation Based Formal Methods and Future Challenges , 2001, Informatics.
[2] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[3] Radu Sion,et al. Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.
[4] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[5] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[6] David Gross-Amblard,et al. Query-preserving watermarking of relational databases and XML documents , 2003, PODS '03.
[7] Patrick Cousot,et al. Abstract Interpretation Frameworks , 1992, J. Log. Comput..
[8] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[9] Reinhard Wilhelm. Informatics - 10 Years Back. 10 Years Ahead , 2001, Informatics - 10 Years Back. 10 Years Ahead..
[10] William D. McInerney,et al. 3 – Attacks and Countermeasures , 1987 .
[11] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[12] Lex de Haan,et al. Applied Mathematics for Database Professionals , 2007 .
[13] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[14] Radu Sion,et al. Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..
[15] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[16] Agostino Cortesi,et al. A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.
[17] Ali Al-Haj,et al. Robust and Blind Watermarking of Relational Database Systems , 2008 .
[18] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.