Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
As digital technology over open networks evolves, commercialization of video streams is coming of age. Traditional models for video stream commercialization suffer from copyright ...
We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give recei...
Roger Dingledine, Michael J. Freedman, David Hopwo...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...