Sciweavers

384 search results - page 23 / 77
» A Survey of Watermarking Security
Sort
View
MM
2000
ACM
112views Multimedia» more  MM 2000»
13 years 12 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
TIFS
2010
109views more  TIFS 2010»
13 years 2 months ago
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
Buyer
Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessand...
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 1 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
13 years 12 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser