close
1.

図書

図書
Lynn Batten, Jennifer Seberry (eds.)
出版情報: Berlin : Springer, c2002  xii, 514 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2384
所蔵情報: loading…
2.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
3.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c2001  xi, 522 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2119
所蔵情報: loading…
4.

図書

図書
Mauro Barni ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 414 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3727
所蔵情報: loading…
5.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy ; in cooperation with The International Association for Cryptologic Research (IACR)
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2005  ix, 257 p. ; 28 cm
所蔵情報: loading…
6.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  ix, 283 p. ; 28 cm
所蔵情報: loading…
7.

図書

図書
Jessica Fridrich (ed.)
出版情報: Berlin : Springer, c2004  ix, 369 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3200
所蔵情報: loading…
目次情報: 続きを見る
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
Reversing Global and Local Geometrical Distortions in Image Watermarking / Dariusz Bogumil
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems / Wei Sun ; En-hui Yang
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking / Andrea Abrardo ; Mauro Barni
Steganalysis: Session Chair / Session 2:
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes / Jessica Fridrich
Exploiting Preserved Statistics for Steganalysis / Rainer Böhme ; Andreas Westfeld
Improved Detection of LSB Steganography in Grayscale Images / Andrew D. Ker
An Improved Sample Pairs Method for Detection of LSB Embedding / Peizhong Lu ; Xiangyang Luo ; Qingyang Tang ; Li Shen
Forensic Applications: Session Chair / Session 3:
Statistical Tools for Digital Forensics / Alin C. Popescu ; Hany Farid
Relative Generic Computational Forensic Techniques / Jennifer L. Wong ; Miodrag Potkonjak
Steganography: Session Chair / Session 4:
Syntax and Semantics-Preserving Application-Layer Protocol Steganography / Norka B. Lucena ; James Pease ; Payman Yadollahpour ; Steve J. Chapin
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy / Igor A. Bolshakov
Software Watermarking: Session Chair / John McHughSession 5:
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks / Christian Collberg ; Andrew Huntwork ; Edward Carter ; Gregg Townsend
Threading Software Watermarks / Jasvir Nagra ; Clark Thomborson
Soft IP Protection: Watermarking HDL Codes / Lin Yuan ; Pushkin R. Pari ; Gang Qu
Security and Privacy: Session Chair / Ross AndersonSession 6:
An Asymmetric Security Mechanism for Navigation Signals / Markus G. Kuhn
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme / Jae-Gwi Choi ; Ji-Hwan Park ; Ki-Ryong Kwon
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures / Xinwen Fu ; Bryan Graham ; Dong Xuan ; Riccardo Bettati ; Wei Zhao
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring / Hirofumi Muratani
Anonymity: Session Chair / Andreas PfitzmannSession 7:
Statistical Disclosure or Intersection Attacks on Anonymity Systems / George Danezis ; Andrei Serjantov
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic / Claudia Díaz ; Bart Preneel
The Hitting Set Attack on Anonymity Protocols / Dogan Kesdogan ; Lexi Pimenidis
Data Hiding in Unusual Content: Session Chair / Session 8:
Information Hiding in Finite State Machine
Covert Channels for Collusion in Online Computer Games / Steven J. Murdoch ; Piotr Zielinski
Author Index
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
8.

図書

図書
edited by Csilla Farkas, Pierangela Samarati
出版情報: Boston : Kluwer Academic Publishers, 2004  xii, 384 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 144
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Organization
Contributing Authors
Invited Talk / I:
Invited Talk - Inference Control Problem in Statistical Database Query Systems / L.H. Cox
Access Control. Attribute Mutability in Usage Control / Jaehong Park, et al.II:
Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations / Alturi ; Qui Guo
An Extended Analysis of Delegating Obligations / A. Schaad
Implementing Real-Time Update of Access Control Policies / I. Rai ; Tai Xin
Data Protection Techniques / III:
Defending against Additive Attacks with Maximal Errors in Watermarking Relational Databases / Jingjui Li, et al.
Performances-Conscious Key Management in Encrypted Databases / H. Hacigümüs ; S. Mehrotra
Damage Discovery in Distributed Database Systems / Yanjun Zuo ; B. Panda
Database Theory and Inference Control / IV:
Information Flow Analysis for File Systems and Databases Using Labels / E. Gudes, et al.
Refusal in Incomplete Databases / J. Biskup ; T. Weibert
Why is This User Asking so Many Questions? Explaining Sequences of Queries / A.C. Acar ; A. Motro
System Security Analysis / E. Damiani ; S. De Capitani-de VimercatiV: Invited Talk II Invited Talk - Towards Semantics-Aware Access Control:
RBAC/MAC Security for UML / T. Doan, et al.
Bridges: A Means to Conduct Secure Teleconferences over Public Telephones / I. Youn ; D. Wijesekera
Access Control Design and Management / VII:
Policy-based Security Management for Enterprise Systems / R. Mukkamala, et al.
Pattern System for Access Control / T. Priebe, et al.
Design for Parameterized Roles / Mei Ge ; S.L. Osborn
Distributed Systems / VIII:
Efficient Verification of Delegation in Distributive Group Membership Management / L. Huraj ; H. Reiser
Web Resource Usage Control in RSCLP / S. Barker
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation / I. Ray T. Hajek
Privacy / IX:
On the Damage and Compensation of Privacy Leakage / Da-Wei Wang, et al.
Experimental Study of Distortion-Based Techniques for Association Rule Hiding / E.D. Pontikakis, et al.
Privacy-Preserving Multi-Party Decision Tree Induction / J.Z. Zhan, et al.
Network Protection and Configuration. Configuring Storage Area Networks for Mandatory Security / B. Aziz, et al.X:
Framework for Trusted Wireless Networks / J.S. Park ; A. Jain
Author Index
Preface
Conference Organization
Contributing Authors
9.

図書

図書
editors, David Basin, Peng Ning, Peng Liu
出版情報: New York, NY : Associations for Computing Machinery, c2010  xi, 352 p. ; 28 cm
所蔵情報: loading…
10.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2009  84 p. ; 28 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼