1 |
O. Goldreich, 'Secure Multi-Party Computation', Manuscript, 2002, (Version 1.4)
|
2 |
Zhang, Y. Q. and Emmanuel, S., 'A Novel Watermarking Framework for Joint-Creatorship Protection', Proceedings of Cyberworlds 2005, Singapore, pp. 109-116, Nov. 2005
|
3 |
Guo, H. and Georganas, N. D., 'Digital Image Watermarking for Ownership Verification Without a Trusted Dealer', in Proceedings of ACM Multimedia 2002, Dec. 2002
|
4 |
O. Benedens, 'Geornery-Based Watermarking of 3D models,' IEEE Computer Graphics and Applications', Special Issue on Image Security (January/February 1999), pp. 46-55
|
5 |
Arnold, M., Schmucker, M. and Wolthusen, S. D., 'Digital Watermarking and Content Protection', Artech House, ISBN: 1-58053-111-3, 2003
|
6 |
Menezes, A. J., Oorschot, P. C. and Vanstone, S. A., 'Handbook of Applied Cryptography', CRC Press LLC, 1997
|
7 |
장항배, 이호신, '설계정보 유출 방지를 위한 정보 보안시스템 설계 및 구현', 한국CAD/CAM 학회 논문집, 제11권, 제5호, pp. 327-334, 2006
과학기술학회마을
|
8 |
Cox, I. J., Miller, M. L. and Bloom, J. A., 'Digital Watermarking', Academic Press, ISBN: 1-55860-7 145, 2002
|