Cryptography Reference
In-Depth Information
[CM98]
Camenisch and Michels. A group signature scheme
with improved efficiency. In ASIACRYPT: Advances
in Cryptology - ASIACRYPT: International Conference
on the Theory and Application of Cryptology .LNCS,
Springer-Verlag, 1998.
[CMB01]
Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom.
Digital Watermarking . Morgan Kaufman, San Fran-
sisco, CA, 2001.
[CMB02]
Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom.
Digital watermarking . Morgan Kaufmann Publishers
Inc., San Francisco, CA, USA, 2002.
[CMB07]
Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom.
Digital watermarking and Steganography . M n
Kaufmann Publishers Inc., San Francisco, CA, USA,
2007.
[CMBF08]
Ingemar J. Cox, Matthew Miller, Jeffrey Bloom, and Jes-
sica Fridrich. Digital Watermarking . Morgan Kaufman,
San Francisco, CA, 2008.
[Cop85]
Don Coppersmith. Another birthday attack. In Hugh C.
Williams, editor, CRYPTO , volume 218 of Lecture Notes
in Computer Science , pages 14-17. Springer, 1985.
[Cri90]
Michael Crichton. Jurassic Park . Knopf, New York, 1990.
[CSWH00]
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet:
A distributed anonymous information storage and re-
trieval system. In Proc. of the ICSI Workshop on Design
Issues in Anonymity and Unobservability ,Berkeley,CA,
2000.
[CT02]
Christian S. Collberg and Clark Thomborson. Water-
marking, tamper-proffing, and obfuscation: tools for
software protection. IEEE Trans. Softw. Eng. , 28(8):735-
746, 2002.
[CW93]
K.W. Campbell and M.J. Wiener. DES is not a group.
In Advances in Cryptology-CRYPTO '92 Proceedings .
Springer-Verlag, 1993.
[CW99]
B. Chen and G. Wornell. Achievable performance of
digital watermarking systems, 1999.
Search WWH ::




Custom Search