Fingerprinting Digital Circuits on Programmable Hardware
暂无分享,去创建一个
Miodrag Potkonjak | William H. Mangione-Smith | John Lach | J. Lach | W. Mangione-Smith | M. Potkonjak
[1] R. Stephany,et al. A 200MHz 32b 0.5W CMOS RISC Microprocessor , 1998 .
[2] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[3] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[4] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[5] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[6] Ahmed H. Te. Data Hiding for Multimedia Personalization, Interaction, and Protection , 1997 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Miodrag Potkonjak,et al. Low overhead fault-tolerant FPGA systems , 1998, IEEE Trans. Very Large Scale Integr. Syst..
[9] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[10] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[11] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[12] Bernd Meyer,et al. Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.
[13] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[14] Miodrag Potkonjak,et al. Signature hiding techniques for FPGA intellectual property protection , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[15] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[16] Harrick M. Vin,et al. Multimedia Computing and Networking 1997 , 1996 .
[17] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[18] Steve Furber,et al. ARM System Architecture , 1996 .
[19] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[20] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.
[21] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[22] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[23] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[24] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[25] V. Rich. Personal communication , 1989, Nature.