Sciweavers

6 search results - page 2 / 2
» Some Remarks on Protecting Weak Keys and Poorly-Chosen Secre...
Sort
View
DRM
2003
Springer
13 years 10 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia