Author of the publication

Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.

, , and . EUSIPCO, page 1-4. IEEE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security., and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 246-257. Springer, (2005)Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages., , and . Trans. Data Hiding and Multimedia Security, (2007)Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 204-216. Springer, (2005)Satellite Communication without Privacy - Attacker's Paradise., and . Sicherheit, volume P-62 of LNI, page 257-268. GI, (2005)Parallel simulation of incompressible fluids., , , and . PDP, page 273-280. IEEE Computer Society, (1999)Sound proofs of authorship and distribution of digital rights.. Ruhr University Bochum, (2008)Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure., , and . EUSIPCO, page 1-4. IEEE, (2002)Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages., , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 136-147. Springer, (2006)Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links., and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 469-484. Springer, (2007)Key-assignment strategies for CPPM., and . MM&Sec, page 107-115. ACM, (2004)