Search the dblp DataBase
Marcel Fernandez :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Marcel Fernandez , Josep Cotrina Navau Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:289-303 [Conf ] Oscar Esparza , Marcel Fernandez , Miguel Soriano , Jose L. Muñoz , Jordi Forné Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:927-936 [Conf ] Marcel Fernandez , Miguel Soriano Efficient Identification of Traitors in Fingerprinted Multimedia Contents. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:463-467 [Conf ] Marcel Fernandez , Miguel Soriano Protecting Intellectual Property by Guessing Secrets. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:196-205 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:527-536 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:624-633 [Conf ] Josep Pegueroles , Marcel Fernandez , Francisco Rico-Novella , Miguel Soriano A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:527-536 [Conf ] Marcel Fernandez , Miguel Soriano Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:211-222 [Conf ] Josep Cotrina Navau , Marcel Fernandez , Miguel Soriano A Family of Collusion 2-Secure Codes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:387-397 [Conf ] Marcel Fernandez , Miguel Soriano Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:414-430 [Conf ] Marcel Fernandez , Miguel Soriano Decoding codes with the identifiable parent property. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1028-1033 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q -Ary Case. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:61-73 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:398-409 [Conf ] Marcel Fernandez , Miguel Soriano Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:459-470 [Conf ] Marcel Fernandez , Miguel Soriano Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:763-767 [Conf ] Miguel Soriano , Marcel Fernandez , Elisa Sayrol , Joan Tomas , Joan Casanellas , Josep Pegueroles , Juan Hernández-Serrano Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:411-414 [Conf ] Miguel Soriano , Marcel Fernandez , Josep Cotrina Navau Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:231-243 [Conf ] Elisa Sayrol , Miguel Soriano , Marcel Fernandez , Joan Casanellas , Joan Tomas Development of a platform offering video copyright protection and security against illegal distribution. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:76-83 [Conf ] Marcel Fernandez , Miguel Soriano Soft-Decision Tracing in Fingerprinted Multimedia Content. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2004, v:11, n:2, pp:38-46 [Journal ] Marcel Fernandez , Josep Cotrina Navau , Miguel Soriano , Neus Domingo A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:251-258 [Conf ] Joan Tomàs-Buliart , Marcel Fernandez , Miguel Soriano Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:992-999 [Conf ] New Considerations about the Correct Design of Turbo Fingerprinting Codes. [Citation Graph (, )][DBLP ] On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP ] Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. [Citation Graph (, )][DBLP ] A note about the identifier parent property in Reed-Solomon codes. [Citation Graph (, )][DBLP ] Search in 0.049secs, Finished in 0.051secs