Sciweavers

1307 search results - page 40 / 262
» Follow the intellectual property
Sort
View
DAC
1999
ACM
16 years 23 days ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
15 years 4 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
IADIS
2004
15 years 1 months ago
A design of digital rights management system utilizing multimedia content identifiers
All around of people live in the age based on information and knowledge in recent period. It is WWW/Internet technology that provides efficiency and power, which can lead the new ...
Seok-Hoon Kim, Sang-Hoon Oh, Jung-Hoon Hahm
EUROCRYPT
2000
Springer
15 years 3 months ago
Practical Threshold Signatures
We present an RSA threshold signature scheme. The scheme enjoys the following properties:
Victor Shoup
STOC
2005
ACM
96views Algorithms» more  STOC 2005»
16 years 3 days ago
Every monotone graph property is testable
A graph property is called monotone if it is closed under taking (not necessarily induced) subgraphs (or, equivalently, if it is closed under removal of edges and vertices). Many ...
Noga Alon, Asaf Shapira