Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy |
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
85 | Tianjie Cao, Xianping Mao, Dongdai Lin |
Security Analysis of a Server-Aided RSA Key Generation Protocol. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Server-aided RSA key generation, Handheld device, Collusion attack |
78 | Jae-Min Seol, Seong-Whan Kim |
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
ACC, LCCA, angular decoding, fingerprinting, BIBD |
78 | Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen |
Server-Aided RSA Key Generation Against Collusion Attack. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device |
78 | P. Vinod 0002, Prabin Kumar Bora |
A New Inter-frame Collusion Attack and a Countermeasure. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua |
A New Collusion Attack and Its Performance Evaluation. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Yongdong Wu, Feng Bao 0001 |
Collusion attack on a multi-key secure video proxy scheme. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
collusion attack |
74 | Yongdong Wu, Robert H. Deng |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
71 | H. Vicky Zhao, Min Wu 0001, Z. Jane Wang 0001, K. J. Ray Liu |
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
69 | Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 |
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Jae-Min Seol, Seong-Whan Kim |
Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Hirofumi Muratani |
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack |
61 | Wei Du, Mingxing He |
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
security, Key distribution, self-healing, WSNs, collusion attack |
57 | Shan He 0002, Min Wu 0001 |
Joint coding and embedding techniques for MultimediaFingerprinting. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Z. Jane Wang 0001, Min Wu 0001, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu |
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Shan He 0002, Min Wu 0001 |
Performance Study on Multimedia Fingerprinting Employing Traceability Codes. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Statistical invisibility for collusion-resistant digital video watermarking. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Qingfeng Chen, Shichao Zhang 0001, Yi-Ping Phoebe Chen |
Identifying Dependency Between Secure Messages for Protocol Analysis. |
KSEM |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai |
Some Remarks on Security of Receipt-Free E-auction. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction |
53 | Chao-Yong Hsu, Chun-Shien Lu |
Near-perfect cover image recovery anti-multiple watermark embedding approaches. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li |
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Suphithat Songsiri |
A New Approach for Computation Result Protection in the Mobile Agent Paradigm. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
47 | K. J. Ray Liu, H. Vicky Zhao |
Behavior Forensics in Traitors within Traitors for Scalable Multimedia. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
47 | H. Vicky Zhao, K. J. Ray Liu |
Risk minimization in traitors within traitors in multimedia forensics. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Camélia Constantin, David Gross-Amblard, Meryem Guerrouani |
Watermill: an optimized fingerprinting system for highly constrained data. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
semantic integrity constraints, usability constraints, XML, relational databases, watermarking, fingerprinting |
44 | Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya |
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
44 | Junghyun Nam, Seungjoo Kim, Dongho Won |
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Group key agreement, collusion attack, key authentication |
43 | Minseong Ju, Seoksoo Kim, Tai-Hoon Kim |
A Study on Digital Media Security by Hopfield Neural Network. |
ISNN (3) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Yongdong Wu |
Nonlinear collusion attack on a watermarking scheme for buyer authentication. |
IEEE Trans. Multim. |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yu Zhang, Zang Li, Wade Trappe |
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Xun Yi, Yiming Ye |
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
Access control, RSA, collusion attack, key assignment |
39 | C.-S. Lu, C.-Y. Hsu |
Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Chen Yang, Wenping Ma 0002, Xinmei Wang |
Novel Remote User Authentication Scheme Using Bilinear Pairings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Yongdong Wu |
Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. |
ICASSP (2) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Zhongxuan Liu, Shiguo Lian, Yuan Dong, Haila Wang |
Desynchronized image fingerprint for large scale distribution. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood |
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Udit Budhia, Deepa Kundur, Takis Zourntos |
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon |
Assessing the trustworthiness of location data based on provenance. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
location data, trustworthiness |
27 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
27 | Qingyu Xu, Mingxing He, Lein Harn |
An Improved Time-Bound Hierarchical Key Assignment Scheme. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jin-Heung Lee, Tea-Hun Lim, Keon-Woo Kim, Sang-Uk Shin |
A New Fingerprinting Codes for Multimedia Contents. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
Watermarking for Fingerprinting Code, Trace, Copyrights Protection, Digital Fingerprinting |
27 | Chun-Shien Lu, Chao-Yong Hsu |
Content-Dependent Anti-disclosure Image Watermark. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Wei-Chi Ku, Shuai-Min Chen |
An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees. |
ICPP Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Wei Yang 0011, Liusheng Huang, Lu Li, Mingjun Xiao, Xiaorong Lu, Yao Shen, Youwen Zhu |
Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes. |
IWQoS |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz |
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
code passing, collusion attack, Mobile agent security, malicious hosts |
26 | Koji Nuida |
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint |
26 | Minoru Kuribayashi, Hiroshi Kato, Masakatu Morii |
A Study of Rounding Error on CDMA-Based Fingerprinting Scheme. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
fingerprinting, collusion attack, rounding error |
26 | Minoru Kuribayashi |
A study of traceability of CDMA-based fingerprinting scheme. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
iterative detection, fingerprinting, collusion attack |
26 | Gábor Tardos |
Optimal probabilistic fingerprint codes. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
collusion attack, Fingerprint codes |
26 | Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas |
Collusion-Resistant Video Watermarking Based on Video Mosaicing. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
video watermarking, collusion attack, video mosaicing |
26 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Fingerprinting Relational Databases: Schemes and Specialties. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
robustness, relational database, Fingerprint, collusion attack |
26 | Daniel Schonberg, Darko Kirovski |
Fingerprinting and forensic analysis of multimedia. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
video, audio, fingerprinting, collusion attack, forensic analysis |
25 | Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson 0002, Nimrod Megiddo |
Adaptive traitor tracing for large anonymous attack. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
security, traitor tracing, content protection |
24 | Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii |
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jiande Sun 0001, Ju Liu |
A blind video watermarking scheme based on ICA and shot segmentation. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
shot segmentation, independent component analysis, digital watermark, copyright protection, video watermark |
24 | Won-gyum Kim, Young-Ho Suh |
Short n-secure fingerprinting code for image. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Amir Ghasemkhani, Rutuja Sanjeev Haridas, Seyed Mahmoud Sajjadi Mohammadabadi, Lei Yang 0001 |
Feature Collusion Attack on PMU Data-driven Event Classification. |
ISGT |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Feng Ye, Xianghui Cao, Zheyuan Cheng, Mo-Yuen Chow |
CASL: A Novel Collusion Attack Against Distributed Energy Management Systems. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Xiaowen Wang, Jie Huang 0016, Chunyang Qi, Yang Peng, Shuaishuai Zhang |
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay. |
PeerJ Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Weidong Du, Min Li, Xiaoyuan Yang 0002, Liqiang Wu, Tanping Zhou |
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning. |
Pervasive Mob. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Xinxin Qi, Xiaodong Fu, Fei Dai 0002, Li Liu 0032, Lijun Liu, Jiaman Ding, Wei Peng 0004 |
Collusion Attack Analysis and Detection of DPoS Consensus Mechanism. |
BlockSys |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Burhan Ul Islam Khan, Farhat Anwar, Rashidah Funke Olanrewaju, Miss Laiha Mat Kiah, Roohie Naaz Mir |
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Zhaobo Lu, Jin Wang 0009, Jingya Zhou, Jianping Wang 0001, Kejie Lu |
Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack. |
ICA3PP (1) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Jun Gu, Tzonelih Hwang |
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
21 | Peter Shaojui Wang |
Insider Collusion Attack on Distributed Machine Learning System and its Solutions - A Case of SVM. |
APKC@AsiaCCS |
2020 |
DBLP DOI BibTeX RDF |
|
21 | André Nasserala, Ian Vilar Bastos, Igor Monteiro Moraes |
Cache nFace: a simple countermeasure for the producer-consumer collusion attack in Named Data Networking. |
Ann. des Télécommunications |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Subhasis Thakur, John G. Breslin |
Collusion Attack from Hubs in The Blockchain Offline Channel Network. |
MARBLE |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Tomasz Hyla, Jerzy Pejas |
Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Ryma Abassi |
Dealing with Collusion Attack in a Trust-Based MANET. |
Cybern. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin 0001 |
Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures. |
ICCCS (5) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen |
Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. |
APSIPA |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Tribhuwan Kumar Tewari, Vikas Saxena |
Collusion Attack Resistant SVD Based Secured Audio Watermarking Scheme with Chaotic Encryption. |
IC3 |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Yunhao Liu 0001, Xiaohong Li 0001, Zhiyong Feng 0002, Jianye Hao |
An Improved Android Collusion Attack Detection Method Based on Program Slicing. |
ICFEM |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Tomasz Hyla, Jerzy Pejas |
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. |
CISIM |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Yanming Sun, Min Chen 0003, Abel Bacchus, Xiaodong Lin 0001 |
Towards collusion-attack-resilient group key management using one-way function tree. |
Comput. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Peter Shaojui Wang, Feipei Lai, Hsu-Chun Hsiao, Ja-Ling Wu |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems. |
IEEE Access |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jihah Nah, JongWeon Kim |
Collusion attack-resistant watermarking scheme using correlation peak position modulation. |
Multim. Tools Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Wei Yang 0011, Liusheng Huang, Xiaorong Lu, Yao Shen |
CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes. |
SECON |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Yuhong Liu, Na Li 0008 |
An Advanced Collusion Attack against User Friendship Privacy in OSNs. |
COMPSAC |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Tengteng Shen, WenAn Tan, Yong Sun, Li Huang |
Identifying Collusion Attack Based on Preference Similarity in Mixed Reputation Recommendation Model. |
HCC |
2016 |
DBLP DOI BibTeX RDF |
|
21 | André Nasserala, Igor Monteiro Moraes |
Analyzing the producer-consumer collusion attack in Content-Centric Networks. |
CCNC |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Md. Zakirul Alam Bhuiyan, Jie Wu 0001 |
Collusion Attack Detection in Networked Systems. |
DASC/PiCom/DataCom/CyberSciTech |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hui Feng 0002, Langxiong Gan, Hefei Ling, Fuhao Zou, Zhengding Lu |
A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting. |
Multim. Tools Appl. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Iman Kashefi, Maryam Kassiri, Mazleena Salleh |
Preventing collusion attack in android. |
Int. Arab J. Inf. Technol. |
2015 |
DBLP BibTeX RDF |
|
21 | Jikai Teng, Chuankun Wu |
A collusion attack on asymmetric group key exchange. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Seyed Ali Mousavifar, Cyril Leung |
Centralized Collusion Attack in Cognitive Radio Collaborative Spectrum Sensing. |
VTC Fall |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Jalal Etesami, Negar Kiyavash |
A novel collusion attack on finite alphabet digital fingerprinting systems. |
ISIT |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Sherman S. M. Chow, Man Ho Au, Willy Susilo |
Server-aided signatures verification secure against collusion attack. |
Inf. Secur. Tech. Rep. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Basit Qureshi, Geyong Min, Demetres D. Kouvatsos |
Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs. |
Multim. Tools Appl. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha |
Optimized Spread Spectrum Watermarking for Fading-Like Collusion Attack with Improved Detection Performance. |
Wirel. Pers. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Hui Feng 0002, Hefei Ling, Fuhao Zou, WeiQi Yan 0001, Mudar Sarem, Zhengding Lu |
A collusion attack optimization framework toward spread-spectrum fingerprinting. |
Appl. Soft Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ang Gao, Zengzhi Li |
Free global ID against collusion attack on multi-authority attribute-based encryption. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Hui Feng 0002, Hefei Ling, Fuhao Zou, WeiQi Yan 0001, Zhengding Lu |
A collusion attack optimization strategy for digital fingerprinting. |
ACM Trans. Multim. Comput. Commun. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou |
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. |
Int. J. Distributed Sens. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Xin-Wei Li, Bao-Long Guo, Xianxiang Wu, Lei-Da Li |
On Collusion Attack for Digital Fingerprinting. |
J. Inf. Hiding Multim. Signal Process. |
2011 |
DBLP BibTeX RDF |
|
21 | Tran Thanh Dai, Johnson I. Agbinya |
Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks. |
Secur. Commun. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sherman S. M. Chow, Man Ho Au, Willy Susilo |
Server-aided signatures verification secure against collusion attack. |
AsiaCCS |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ryotaro Hayashi 0001, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada |
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Seba Maity, Jaya Sil, Santi P. Maity, Claude Delpha |
Optimized spread spectrum watermarking for fading-like collusion attack. |
WPMC |
2011 |
DBLP BibTeX RDF |
|