共 50 条
- [41] Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol [J]. MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 205 - 213
- [43] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
- [45] Buyer-seller watermarking protocols with off-line trusted parties [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1035 - +
- [46] A privacy-preserving buyer-seller watermarking protocol with semi-trust third party [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 44 - 53
- [47] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +
- [48] A New and Efficient Buyer-Seller Digital Watermarking Protocol Using Identity Based Technique for Copyright Protection [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 531 - 535
- [50] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382