The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Caroline Fontaine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daniel Augot, Caroline Fontaine
    Key issues for watermarking digital images. [Citation Graph (0, 0)][DBLP]
    Electronic Imaging, 1998, pp:176-185 [Conf]
  2. Daniel Augot, Jean-François Delaigle, Caroline Fontaine
    DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:241-255 [Conf]
  3. Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
    Enhanced Security Architecture for Music Distribution on Mobile. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:97-109 [Conf]
  4. Anne Canteaut, Claude Carlet, Pascale Charpin, Caroline Fontaine
    Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:507-522 [Conf]
  5. Eric Filiol, Caroline Fontaine
    Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:475-488 [Conf]
  6. Eric Filiol, Caroline Fontaine
    A New Ultrafast Stream Cipher Design: COS Ciphers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:85-98 [Conf]
  7. Martin Steinebach, Jana Dittmann, Christian Seibel, Lucilla Croce Ferri, Fabien A. P. Petitcolas, Nazim Fatès, Caroline Fontaine, Frédéric Raynal
    StirMark Benchmark: Audio Watermarking Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:49-54 [Conf]
  8. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking Attack: Security of WSS Techniques. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:171-183 [Conf]
  9. Vincent Bénony, François Recher, Eric Wegrzynowski, Caroline Fontaine
    Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator. [Citation Graph (0, 0)][DBLP]
    SETA, 2004, pp:313-322 [Conf]
  10. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part one: Theory. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:746-757 [Conf]
  11. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part two: Practice. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:758-768 [Conf]
  12. Anne Canteaut, Claude Carlet, Pascale Charpin, Caroline Fontaine
    On cryptographic properties of the cosets of R(1, m). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:4, pp:1494-1513 [Journal]
  13. Caroline Fontaine
    On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1237-1243 [Journal]

  14. How Can Reed-Solomon Codes Improve Steganographic Schemes? [Citation Graph (, )][DBLP]


  15. On-off keying modulation and tardos fingerprinting. [Citation Graph (, )][DBLP]


  16. Better security levels for broken arrows. [Citation Graph (, )][DBLP]


  17. Expectation maximization decoding of Tardos probabilistic fingerprinting code. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002