1 |
W. Trappe, M. Wu and K. Liu, 'Collusionresistant fingerprinting for multimedia,' IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 4, pp. 3309-3312, 2002
DOI
|
2 |
B. Pfitzmann and M. Schunter, 'Asymmetric fingerprinting,' In Advances in Cryptology-EYROCRYPT'96, LNCS 1070, pp. 84-95, 1996
|
3 |
C. Chung, S. Choi, Y. Choi and D. Won, 'Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors,' ICICS 2000, LNCS 2015, pp. 221-234, 2001
|
4 |
D. Chaum, I. B. Damagaard and J. vad de Graaf, 'Multiparty computations ensuring privacy of each party's input and correctness of the result,' In Advances in Cryptology -CRYPTO'87, LNCS 293, pp. 87-119, 1988
|
5 |
J. Domingo-Ferrer, 'Anonymous fingerprinting based on committed oblivious transfer.' PKC 1999, LNCS 1560, pp. 43-52. 1999
|
6 |
B. Pfitzmann and A. R. Sadeghi, 'Coin-based anonymous fingerprinting,' In Advances in Cryptology-EUROCRYPT '99, LNCS 1592, pp, 150-164, 1999
|
7 |
G. Blakley, C. Meadow and G. B. Purdy, 'Fingerprinting long forgiving messages,' In Advances in Cryptology-CRYPTO'85, LNCS 218, pp. 180-189, 1986
|
8 |
D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' In Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 452-465, 1995
|
9 |
M. Kuribayashi and H. Tanaka, A new anonymous fingerprinting scheme with high enciphering rate,' INDOCRYPT'01, LNCS 22247, pp. 30-39, 200
|
10 |
B. Pfitzmann and M. Waidner, 'Anonymous fingerprinting,' In Advances in Cryptology-EUROCRYPT'97, LNCS 1233. pp. 88-102, 1997
|
11 |
C. Schnorr, 'Efficient signature generation for smart cards,' Journal of Cryptology. 4(3), pp. 161-174, 1991
DOI
|
12 |
J. Domingo-Ferrer, 'Anonymous fingerprinting of electronic information with automatic identification redistributors,' LEE Electronic Letters, Vol. 43. No. 13, 1998
DOI
ScienceOn
|
13 |
A. Shamir, 'How to share a secret,' CACM, 22(11), pp. 612-613, 1979
DOI
ScienceOn
|