共 50 条
- [1] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382
- [2] On the (in)security of two buyer-seller watermarking protocols [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
- [3] Formal Analysis of Two Buyer-Seller Watermarking Protocols [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
- [4] An anonymous buyer-seller watermarking protocol with anonymity control [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 421 - 432
- [5] Cloud-based Buyer-Seller Watermarking Protocols [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
- [6] Towards transferable watermarks in buyer-seller watermarking protocols [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
- [7] A buyer-seller watermarking protocol [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
- [8] A buyer-seller watermarking protocol [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
- [9] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
- [10] Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 951 - +