최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 시스템 및 이론, v.34 no.7, 2007년, pp.288 - 295
용승림 (이화여자대학교 컴퓨터학과) , 이상호 (이화여자대학교 컴퓨터학과)
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques....
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
R. Wagner, 'Fingerprinting,' IEEE Symposium on Security and Privacy, Oakland, pp. 18-22, 1983
S. Katzenveisser and F. Petitcolas, Information Hiding, 'Techniques for steganography and digital watermarking,' Artech House, 2000
B. Pfitzmann and M. Waidner, 'Anonymous fingerprinting,' In Advances in Cryptology - EUROCRYPT' 97, LNCS 1233, pp. 88-102, 1997
J. Camenish, 'Efficient anonymous fingerprinting with group signature,' Asisacrypt 2000, LNCS 1976, pp. 415-428, 2000
J. Domingo-Ferrer, 'Anonymous fingerprinting of electronic information with automatic identification redistributors,' IEE Electronic Letters, Vol. 43, No. 13, 1998
M. Kuribayashi and H. Tanaka, 'A new anonymous fingerprinting scheme with high enciphering rate,' INDOCRYPT' 01 , LNCS 22247, pp. 30-39, 2001
G. Blakley, C. Meadow and G. B. Purdy, 'Fingerprinting long forgiving messages,' In Advances in Cryptology - CRYPTO'85, LNCS 218, pp. 180-189, 1986
B. Pfitzmann and M. Schunter, 'Asymmetric fingerprinting,' In Advances in Cryptology - EUROCRYPT' 96, LNCS 1070, pp. 84-95, 1996
H. Ju, H. Kim, D. LEE and J. Lim, 'An anonymous buyer-seller watermarking protocol with anonymity control,' International Conference on Information and Communication Security(ICICS'02), LNCS 2587, pp. 421-432, 2003
J. G. Choi, K. Sakurai and J. H. Park, 'Does it need trusted third party? Design of buyer-seller watermarking in digital contents,' Applied Cryptography and Network Security(ACNS'03), LNCS 2846, pp. 265-279, 2003
D. Chaum, 'An improved protocol for demonstrating possession of discrete logarithms and some generalizations,' In Advances in Cryptology - EUROCRYPT '87, LNCS 304, pp. 127-141, 1987
N. Memon and P. W. Wong, 'A buyer-seller watermarking protocol,' IEEE Transactions on Image Processing, Vol. 10, No.4, pp. 643-649, 2001
http://www.kazaa.com
http://www.edonkey2000.com
I. J. Cox, J. Kilian, T. Leighton and T. Shamnon, 'Secure spread spectrum watermarking for image, audio and video,' IEEE Transactions on Image processing, vol.6, no 12, pp. 1673-1678, 1997
※ AI-Helper는 부적절한 답변을 할 수 있습니다.