From post

Collusion-resistant multimedia fingerprinting: a unified framework.

, , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5306 из Proceedings of SPIE, стр. 748-759. SPIE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using the physical layer for wireless authentication in time-variant channels., , , и . IEEE Trans. Wirel. Commun., 7 (7): 2571-2579 (2008)A Multi-Jammer Power Control Game., , , и . IEEE Commun. Lett., 25 (9): 3031-3035 (2021)Multi-User Security: A Signal Processing and Networking Perspective.. University of Maryland, College Park, MD, USA, (2002)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/24911).The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation., , и . GLOBECOM, стр. 5117-5122. IEEE, (2007)Physical Layer Techniques for Enhanced Situational Awareness., и . ICASSP, стр. 2234-2237. IEEE, (2010)The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study., , , , и . DCOSS, том 4026 из Lecture Notes in Computer Science, стр. 546-563. Springer, (2006)An efficient key management scheme for secure wireless multicast., , и . ICC, стр. 1236-1240. IEEE, (2002)A scalable multicast key management scheme for heterogeneous wireless networks., , и . IEEE/ACM Trans. Netw., 12 (4): 653-666 (2004)An efficient key management scheme for secure wireless multicast., , и . ICC, стр. 1236-1240. IEEE, (2002)Subverting MIMO wireless systems by jamming the channel estimation procedure., и . WISEC, стр. 19-24. ACM, (2010)