Watermarking graph partitioning solutions
暂无分享,去创建一个
[1] I. Torunoglu,et al. Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.
[2] Andrew B. Kahng,et al. Multilevel circuit partitioning , 1998, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Miodrag Potkonjak,et al. Robust FPGA intellectual property protection through multiple small watermarks , 1999, DAC '99.
[5] Miodrag Potkonjak,et al. Fingerprinting intellectual property using constraint-addition , 2000, DAC.
[6] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Miodrag Potkonjak,et al. Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[9] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[10] Edoardo Charbon,et al. Watermarking-based copyright protection of sequential functions , 1999 .
[11] Vipin Kumar,et al. A Fast and High Quality Multilevel Scheme for Partitioning Irregular Graphs , 1998, SIAM J. Sci. Comput..
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[14] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[15] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[16] Miodrag Potkonjak,et al. Fingerprinting techniques for field-programmable gate arrayintellectual property protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[17] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[18] R. M. Mattheyses,et al. A Linear-Time Heuristic for Improving Network Partitions , 1982, 19th Design Automation Conference.
[19] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[20] Miodrag Potkonjak,et al. Techniques for intellectual property protection of DSP designs , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[21] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[22] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[23] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[24] Rupak Majumdar,et al. Watermarking of SAT using combinatorial isolation lemmas , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[25] Giovanni De Micheli,et al. Partitioning of functional models of synchronous digital systems , 1990, 1990 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers.
[26] Miodrag Potkonjak,et al. Forensic engineering techniques for VLSI CAD tools , 2000, Proceedings 37th Design Automation Conference.
[27] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[28] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[29] Miodrag Potkonjak,et al. Watermarking graph partitioning solutions , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[30] Andrew B. Kahng,et al. Recent directions in netlist partitioning: a survey , 1995, Integr..
[31] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[32] Frank Vahid,et al. Incremental hardware estimation during hardware/software functional partitioning , 1995, IEEE Trans. Very Large Scale Integr. Syst..
[33] Miodrag Potkonjak,et al. Intellectual Property Metering , 2001, Information Hiding.
[34] C.-C. Jay Kuo,et al. Blind digital watermarking for cartoon and map images , 1999, Electronic Imaging.
[35] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[36] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[37] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[38] Jason Cong,et al. Intellectual property protection by watermarking combinational logic synthesis solutions , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[39] Miodrag Potkonjak,et al. Watermarking while preserving the critical path , 2000, Proceedings 37th Design Automation Conference.
[40] Arlindo L. Oliveira. Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.