Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646512.695357guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)

Published: 27 February 1997 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2013)An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarkingProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482525(35-44)Online publication date: 17-Jun-2013
  • (2010)A provably secure anonymous buyer-seller watermarking protocolIEEE Transactions on Information Forensics and Security10.1109/TIFS.2010.20728305:4(920-931)Online publication date: 1-Dec-2010
  • (2006)Collusion secure convolutional fingerprinting information codesProceedings of the 2006 ACM Symposium on Information, computer and communications security10.1145/1128817.1128856(266-274)Online publication date: 21-Mar-2006
  • Show More Cited By
  1. Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      STACS '97: Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
      February 1997
      608 pages
      ISBN:3540626166

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 27 February 1997

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2013)An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarkingProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482525(35-44)Online publication date: 17-Jun-2013
      • (2010)A provably secure anonymous buyer-seller watermarking protocolIEEE Transactions on Information Forensics and Security10.1109/TIFS.2010.20728305:4(920-931)Online publication date: 1-Dec-2010
      • (2006)Collusion secure convolutional fingerprinting information codesProceedings of the 2006 ACM Symposium on Information, computer and communications security10.1145/1128817.1128856(266-274)Online publication date: 21-Mar-2006
      • (2000)Fingerprinting intellectual property using constraint-additionProceedings of the 37th Annual Design Automation Conference10.1145/337292.337586(587-592)Online publication date: 1-Jun-2000
      • (1999)Coin-based anonymous fingerprintingProceedings of the 17th international conference on Theory and application of cryptographic techniques10.5555/1756123.1756139(150-164)Online publication date: 2-May-1999
      • (1999)Effective iterative techniques for fingerprinting design IPProceedings of the 36th annual ACM/IEEE Design Automation Conference10.1145/309847.310083(843-848)Online publication date: 1-Jun-1999
      • (1997)Anonymous fingerprintingProceedings of the 16th annual international conference on Theory and application of cryptographic techniques10.5555/1754542.1754553(88-102)Online publication date: 11-May-1997
      • (1997)Asymmetric fingerprinting for larger collusionsProceedings of the 4th ACM conference on Computer and communications security10.1145/266420.266453(151-160)Online publication date: 1-Apr-1997

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media