共 50 条
[31]
An intellectual property right protection scheme for digital images using Support Vector Machines
[J].
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES,
2002, 2
:288-295
[32]
On the Implementation of a Intellectual Property Protection based on Information Hiding
[J].
2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC),
2012,
[33]
Intellectual Property Rights Protection in Peer to Peer Networks
[J].
NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES,
2010, 26
:171-+
[35]
Cryptanalysis of UCLA watermarking schemes for intellectual property protection
[J].
INFORMATION HIDING,
2003, 2578
:213-225
[36]
A Light-Weight Certificate-Less Public Key Cryptography Scheme Based on ECC
[J].
2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN),
2014,
[37]
DS-AKA-A Novel Secured Authentication Protocol for LTE-A Using Public Key Cryptography
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2017, 18 (04)
:753-763
[40]
Robust GF(p) parallel arithmetic unit for public key cryptography
[J].
DSD 2007: 10TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS,
2007,
:109-115