Cryptography Reference
In-Depth Information
[BS95]
D Boneh and J Shaw. Collusion-secure fingerprinting
for digital data. In 15th Annual International Cryptology
Conference , number 963, pages 452-465, Santa Barbara,
California, U.S.A., 27-31 1995.
[BS99]
R.W. Buccigrossi and E.P. Simoncelli. Image com-
pression via joint statistical characterization in the
wavelet domain. IEEE Transactions on Image Process-
ing , 8(12):1688-1701, 1999.
[BSMA05]
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, and
Ismail Avcibas. Source camera identification based on
cfa interpolation. In ICIP (3) , pages 69-72, 2005.
[BVR05]
Nader Bagherzadeh, Mateo Valero, and Alex Ramırez,
editors. Proceedings of the Second Conference on Com-
puting Frontiers, 2005, Ischia, Italy, May 4-6, 2005 .ACM,
2005.
[BY86]
J.C. Benaloh and M. Yung. Distributing the power of
government to enhance the privacy of voters. Proceed-
ings of the 5th ACM Symposium on the Principles in Dis-
tributed Computing , 1986.
[CC96]
Lorrie Cranor and R. Cytron. Design and implementa-
tion of a practical security-conscious electronic polling
system. Technical Report WUCS-96-02, Washington
University Department of Computer Science, St. Louis,
1996.
[CCJS07]
Jan Camenisch, Christian S. Collberg, Neil F. Johnson,
and Phil Sallee, editors. Information Hiding, 8th Inter-
national Workshop, IH 2006, Alexandria, VA, USA, July
10-12, 2006. Revised Selected Papers , volume 4437 of
Lecture Notes in Computer Science . Springer, 2007.
[CD97]
Mark Chapman and George Davida. Hiding the hidden:
A software system for concealing ciphertext as innocu-
ous text. In International Conference on Information
and Computer Security (ICICS'97) ,Beijing,P.R.China,
November 1997.
[CFN93]
David Chaum, Amos Fiat, and Moni Naor. Untrace-
able electronic cash. In Proceedings of Crypto 88 ,page
???, New York, Berlin, Heidelberg, London, Paris, Tokyo,
1993. Springer-Verlag.
Search WWH ::




Custom Search