Author of the publication

WBE-Based Anti-collusion Fingerprints: Design and Detection.

, and . Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion-resistant fingerprints from WBE sequence sets., and . ICC, page 1336-1340. IEEE, (2005)Secrecy capacity region of a class of one-sided interference channel., , and . ISIT, page 379-383. IEEE, (2008)Secret communication on interference channels., , and . ISIT, page 374-378. IEEE, (2008)Robust statistical methods for securing wireless localization in sensor networks., , , and . IPSN, page 91-98. IEEE, (2005)Robust Wireless Localization: Attacks and Defenses., , , , and . Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer, (2007)Modeling professional similarity by mining professional career trajectories., , , , and . KDD, page 1945-1954. ACM, (2014)Securing wireless systems via lower layer enforcements., , , and . Workshop on Wireless Security, page 33-42. ACM, (2006)Achieving Secret Communication for Fast Rayleigh Fading Channels., , and . IEEE Trans. Wireless Communications, 9 (9): 2792-2799 (2010)Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems., , and . IEEE Trans. Information Forensics and Security, 3 (2): 259-272 (2008)A semantic authorization model for pervasive healthcare., , and . J. Network and Computer Applications, (2014)