Author of the publication

Multimedia Copyright Protection Platform Demonstrator.

, , , , , , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 411-414. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalization of traceability codes using ideal-based codes., and . ITW, page 66-69. IEEE, (2003)Multicast Copyright Protection System Based on a Trusted Soft-Engine., , , and . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)A New Class of Codes for Fingerprinting Schemes., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 398-409. Springer, (2005)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , and . ISCC, page 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , and . ISCC, page 251-256. IEEE Computer Society, (2003)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 927-936. Springer, (2003)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)Practical Asymmetric Fingerprinting with a TTP., , , and . DEXA Workshops, page 352-356. IEEE Computer Society, (2003)DocCloud: A document recommender system on cloud computing with plausible deniability., , , and . Inf. Sci., (2014)On the relationship between the traceability properties of Reed-Solomon codes., , and . Adv. in Math. of Comm., 6 (4): 467-478 (2012)