Sciweavers

146 search results - page 10 / 30
» Sequential Traitor Tracing
Sort
View
JUCS
2010
155views more  JUCS 2010»
13 years 3 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi
MA
2010
Springer
147views Communications» more  MA 2010»
13 years 7 months ago
On asymptotic normality of sequential LS-estimate for unstable autoregressive process AR(2)
For estimating parameters in an unstable AR(2) model, the paper proposes a sequential least squares estimate with a special stopping time defined by the trace of the observed Fis...
Leonid Galtchouk, Victor Konev
ASIACRYPT
2003
Springer
14 years 2 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
BIRTHDAY
2004
Springer
14 years 2 months ago
Models for Data-Flow Sequential Processes
A family of mathematical models of nondeterministic data flow is introduced. These models are constructed out of sets of traces, successes, failures and divergences, cf. Hoare’s...
Mark B. Josephs
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 2 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...