Login / Signup

Cryptographic methods for collusion-secure fingerprinting of digital data.

Ingrid BiehlBernd Meyer
Published in: Comput. Electr. Eng. (2002)
Keyphrases
  • database
  • digital data
  • real world
  • e learning
  • end users
  • information retrieval systems
  • data integration
  • smart card
  • digital content
  • key management
  • security protocols