|
Conferences in DBLP
- Minoru Kuribayashi, Hatsukazu Tanaka
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:1-14 [Conf]
- Oliver Benedens
Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:15-29 [Conf]
- René Rosenbaum, Heidrun Schumann
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:30-43 [Conf]
- Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:44-53 [Conf]
- Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
Region-Based Watermarking by Distribution Adjustment. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:54-68 [Conf]
- Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus
Hiding Information in Color Images Using Small Color Palettes. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:69-81 [Conf]
- Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:82-96 [Conf]
- Tina Lindkvist
Characteristics of Some Binary Codes for Fingerprinting. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:97-107 [Conf]
- Kazumasa Omote, Atsuko Miyaji
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:108-120 [Conf]
- Toru Nakanishi, Yuji Sugiyama
Unlinkable Divisible Electronic Cash. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:121-134 [Conf]
- Sung-Ming Yen, Yuliang Zheng
Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:135-148 [Conf]
- Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:149-163 [Conf]
- Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot
Towards a Practical Secure Framework for Mobile Code Commerce. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:164-178 [Conf]
- Ali Aydin Selçuk, Deepinder P. Sidhu
Probabilistic Methods in Multicast Key Management. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:179-193 [Conf]
- DongGook Park, Colin Boyd, Ed Dawson
Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:194-208 [Conf]
- Colin Boyd, Peter Kearney
Exploring Fair Exchange Protocols Using Specification Animation. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:209-223 [Conf]
- Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:224-236 [Conf]
- Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
An Efficient Protocol for Certified Electronic Mail. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:237-248 [Conf]
- Xiaodong Lin, Johnny W. Wong, Weidong Kou
Performance Analysis of Secure Web Server Based on SSL. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:249-261 [Conf]
- Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue
Sherlock: Commercial High Assurance Network Computing. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:262-276 [Conf]
- Christian Payne
The Role of the Development Process in Operating System Security. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:277-291 [Conf]
- Reihaneh Safavi-Naini, Willy Susilo
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:292-307 [Conf]
- Ron Steinfeld, Yuliang Zheng
A Signcryption Scheme Based on Integer Factorization. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:308-322 [Conf]
|