Cryptography Reference
In-Depth Information
[BS95]
D Boneh and J Shaw. Collusion-secure fingerprinting
for digital data. In
15th Annual International Cryptology
Conference
, number 963, pages 452-465, Santa Barbara,
California, U.S.A., 27-31 1995.
[BS99]
R.W. Buccigrossi and E.P. Simoncelli. Image com-
pression via joint statistical characterization in the
wavelet domain.
IEEE Transactions on Image Process-
ing
, 8(12):1688-1701, 1999.
[BSMA05]
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, and
Ismail Avcibas. Source camera identification based on
cfa interpolation. In
ICIP (3)
, pages 69-72, 2005.
[BVR05]
Nader Bagherzadeh, Mateo Valero, and Alex Ramırez,
editors.
Proceedings of the Second Conference on Com-
puting Frontiers, 2005, Ischia, Italy, May 4-6, 2005
.ACM,
2005.
[BY86]
J.C. Benaloh and M. Yung. Distributing the power of
government to enhance the privacy of voters.
Proceed-
ings of the 5th ACM Symposium on the Principles in Dis-
tributed Computing
, 1986.
[CC96]
Lorrie Cranor and R. Cytron. Design and implementa-
tion of a practical security-conscious electronic polling
system. Technical Report WUCS-96-02, Washington
University Department of Computer Science, St. Louis,
1996.
[CCJS07]
Jan Camenisch, Christian S. Collberg, Neil F. Johnson,
and Phil Sallee, editors.
Information Hiding, 8th Inter-
national Workshop, IH 2006, Alexandria, VA, USA, July
10-12, 2006. Revised Selected Papers
, volume 4437 of
Lecture Notes in Computer Science
. Springer, 2007.
[CD97]
Mark Chapman and George Davida. Hiding the hidden:
A software system for concealing ciphertext as innocu-
ous text. In
International Conference on Information
and Computer Security (ICICS'97)
,Beijing,P.R.China,
November 1997.
[CFN93]
David Chaum, Amos Fiat, and Moni Naor. Untrace-
able electronic cash. In
Proceedings of Crypto 88
,page
???, New York, Berlin, Heidelberg, London, Paris, Tokyo,
1993. Springer-Verlag.