Cryptography Reference
In-Depth Information
[CM98]
Camenisch and Michels. A group signature scheme
with improved efficiency. In
ASIACRYPT: Advances
in Cryptology - ASIACRYPT: International Conference
on the Theory and Application of Cryptology
.LNCS,
Springer-Verlag, 1998.
[CMB01]
Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom.
Digital Watermarking
. Morgan Kaufman, San Fran-
sisco, CA, 2001.
[CMB02]
Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom.
Digital watermarking
. Morgan Kaufmann Publishers
Inc., San Francisco, CA, USA, 2002.
[CMB07]
Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom.
Digital watermarking and Steganography
. M n
Kaufmann Publishers Inc., San Francisco, CA, USA,
2007.
[CMBF08]
Ingemar J. Cox, Matthew Miller, Jeffrey Bloom, and Jes-
sica Fridrich.
Digital Watermarking
. Morgan Kaufman,
San Francisco, CA, 2008.
[Cop85]
Don Coppersmith. Another birthday attack. In Hugh C.
Williams, editor,
CRYPTO
, volume 218 of
Lecture Notes
in Computer Science
, pages 14-17. Springer, 1985.
[Cri90]
Michael Crichton.
Jurassic Park
. Knopf, New York, 1990.
[CSWH00]
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet:
A distributed anonymous information storage and re-
trieval system. In
Proc. of the ICSI Workshop on Design
Issues in Anonymity and Unobservability
,Berkeley,CA,
2000.
[CT02]
Christian S. Collberg and Clark Thomborson. Water-
marking, tamper-proffing, and obfuscation: tools for
software protection.
IEEE Trans. Softw. Eng.
, 28(8):735-
746, 2002.
[CW93]
K.W. Campbell and M.J. Wiener. DES is not a group.
In
Advances in Cryptology-CRYPTO '92 Proceedings
.
Springer-Verlag, 1993.
[CW99]
B. Chen and G. Wornell. Achievable performance of
digital watermarking systems, 1999.