共 50 条
- [1] On the (in)security of two buyer-seller watermarking protocols [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
- [2] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +
- [3] Cloud-based Buyer-Seller Watermarking Protocols [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
- [4] Towards transferable watermarks in buyer-seller watermarking protocols [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
- [5] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382
- [6] A buyer-seller watermarking protocol [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
- [7] A buyer-seller watermarking protocol [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
- [8] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
- [9] Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 951 - +