Sciweavers

26 search results - page 1 / 6
» Fighting Two Pirates
Sort
View
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
13 years 10 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
ICICS
2003
Springer
13 years 10 months ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
SPAA
2004
ACM
13 years 10 months ago
Fighting against two adversaries: page migration in dynamic networks
Page migration is one of the fundamental subproblems in the framework of data management in networks. It occurs in a distributed network of processors sharing one indivisible memo...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...
CCS
2008
ACM
13 years 6 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
ECIS
2004
13 years 6 months ago
Fight risk with risk: reflexivity of risk and globalization in IS
In this paper, we address the following research question: "How can we understand the nature of risk in IS projects in the context of globalization?" Based on a case stu...
Edoardo Jacucci, Miria Grisot, Ole Hanseth