Author of the publication

Multicast Copyright Protection System Based on a Trusted Soft-Engine.

, , , and . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 927-936. Springer, (2003)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)A New Class of Codes for Fingerprinting Schemes., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 398-409. Springer, (2005)A generalization of traceability codes using ideal-based codes., and . ITW, page 66-69. IEEE, (2003)Multicast Copyright Protection System Based on a Trusted Soft-Engine., , , and . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , and . ISCC, page 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , and . ISCC, page 251-256. IEEE Computer Society, (2003)Practical Asymmetric Fingerprinting with a TTP., , , and . DEXA Workshops, page 352-356. IEEE Computer Society, (2003)?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error., , and . Online Inf. Rev., 31 (1): 22-37 (2007)DocCloud: A document recommender system on cloud computing with plausible deniability., , , and . Inf. Sci., (2014)