Sciweavers

13 search results - page 2 / 3
» ih 2001
Sort
View
IH
2001
Springer
13 years 9 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
IH
2001
Springer
13 years 9 months ago
The Strong Eternity Service
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Tonda Benes
IH
2001
Springer
13 years 9 months ago
Intellectual Property Metering
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
IH
2001
Springer
13 years 9 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
2001
Springer
13 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu