References


[1] Acken, J. M., ˜ ˜How Watermarking Adds Value to Digital Content, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 75 “77.

[2] Garfinkel, S., with E. H. Spafford, Web Security, Privacy & Commerce, Second Edition , Sebastopol, CA: O Reilly & Associates, 2001.

[3] Lehman, B. A., and R. H. Brown, Intellectual Property and the National Information Infrastructure , Report of the Working Group on Intellectual Property Rights, Section C, Part II, 1995.

[4] Lotspiech, J., U. Kohl, and M. A. Kaplan, ˜ ˜Cryptographic Envelopes and Digital Library, IBM Research Report RJ 10069, 1997.

[5] von Faber, E., E. Hammelrath, and F. P. Heider, ˜ ˜The Secure Distribution of Digital Contents, Proceedings of Annual Computer Security Applications Conference (ACSAC 97), December 1997, pp. 16 “22.

[6] Wagner, N. R., ˜ ˜Fingerprinting, Proceedings of the IEEE Symposium on Security and Privacy , 1983, pp. 18 “22.

[7] Petitcolas, F., and S. Katzenbeisser (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking , Norwood, MA: Artech House, 2000.

[8] Bloom, J., M. Miller, and I. Cox, Digital Watermarking , San Francisco, CN: Morgan Kaufmann Publishers, 2001.

[9] Pfitzmann, B., and M. Schunter, ˜ ˜Asymmetric Fingerprinting, Proceedings of EUROCRYPT 96, pp. 84 “95.

[10] Chor, B., A. Fiat, and M. Naor, ˜ ˜Tracing Traitors, Proceedings of EUROCRYPT 94, pp. 257 “270.

[11] Pfitzmann, B., ˜ ˜Trials of Traced Traitors, Proceedings of Workshop on Information Hiding , 1996, pp. 49 “64.

[12] Craver, S., et al., ˜ ˜Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks, and Implications, IEEE Journal on Selected Areas in Communications , Vol. 16, No. 4, May 1998, pp. 573 “586.

[13] Craver, S., B.-L. Yeo, and M. Yeung, ˜ ˜Technical Trials and Legal Tribulations, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 45 “54.

[14] Zhao, J., E. Koch, and C. Luo, ˜ ˜In Business Today and Tomorrow, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 67 “72.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net