Login / Signup
A publicly verifiable copyright-proving scheme resistant to malicious attacks.
Tzungher Chen
Gwoboa Horng
Wei-Bin Lee
Published in:
IEEE Trans. Ind. Electron. (2005)
Keyphrases
</>
malicious attacks
secret sharing
case study
digital content
detection scheme
machine learning
search engine
information systems
image processing
data structure
digital libraries
classification scheme
secret sharing scheme