共 36 条
- [1] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P155
- [2] Ahmed R. A., 2015, 5 INT C COMM SYST NE
- [3] Al-Haj Ali, 2008, Journal of Computer Sciences, V4, P1024, DOI 10.3844/jcssp.2008.1024.1029
- [4] A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1585 - 1601
- [5] [Anonymous], 2011, INT J COMPUTER APPL
- [6] Bhattacharya S, 2009, ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, P229
- [8] Drandaly K. E., 2020, Int. J. Adv. Sci. Tech., V29, P870
- [9] Databases Traceability by Means of Watermarking with Optimized Detection [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 343 - 357