The SCEAS System
Navigation Menu

Search the dblp DataBase


Marcel Fernandez: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marcel Fernandez, Josep Cotrina Navau
    Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:289-303 [Conf]
  2. Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:927-936 [Conf]
  3. Marcel Fernandez, Miguel Soriano
    Efficient Identification of Traitors in Fingerprinted Multimedia Contents. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:463-467 [Conf]
  4. Marcel Fernandez, Miguel Soriano
    Protecting Intellectual Property by Guessing Secrets. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:196-205 [Conf]
  5. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:527-536 [Conf]
  6. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:624-633 [Conf]
  7. Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano
    A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:527-536 [Conf]
  8. Marcel Fernandez, Miguel Soriano
    Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:211-222 [Conf]
  9. Josep Cotrina Navau, Marcel Fernandez, Miguel Soriano
    A Family of Collusion 2-Secure Codes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:387-397 [Conf]
  10. Marcel Fernandez, Miguel Soriano
    Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:414-430 [Conf]
  11. Marcel Fernandez, Miguel Soriano
    Decoding codes with the identifiable parent property. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:1028-1033 [Conf]
  12. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Tracing Traitors by Guessing Secrets. The q-Ary Case. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:61-73 [Conf]
  13. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:398-409 [Conf]
  14. Marcel Fernandez, Miguel Soriano
    Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:459-470 [Conf]
  15. Marcel Fernandez, Miguel Soriano
    Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:763-767 [Conf]
  16. Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano
    Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:411-414 [Conf]
  17. Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau
    Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:231-243 [Conf]
  18. Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas
    Development of a platform offering video copyright protection and security against illegal distribution. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:76-83 [Conf]
  19. Marcel Fernandez, Miguel Soriano
    Soft-Decision Tracing in Fingerprinted Multimedia Content. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2004, v:11, n:2, pp:38-46 [Journal]
  20. Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo
    A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:251-258 [Conf]
  21. Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano
    Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:992-999 [Conf]

  22. New Considerations about the Correct Design of Turbo Fingerprinting Codes. [Citation Graph (, )][DBLP]

  23. On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP]

  24. Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. [Citation Graph (, )][DBLP]

  25. A note about the identifier parent property in Reed-Solomon codes. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002