Showing 1 - 14 results of 14 for search '"collusive attacks"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    Subjects: “…video watermarking;collusion attack;JND model…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG

    Published 2022-09-01
    Subjects: “…distance-bounding protocol;location authentication;crowdsensing;collusion attack;reputation incentive…”
    Get full text
    Article
  10. 10

    Attribute-based encryption scheme supporting attribute revocation in cloud storage environment by Lei SUN, Zhiyuan ZHAO, Jianhua WANG, Zhiqiang ZHU

    Published 2019-05-01
    Subjects: “…cloud storage;attribute-based encryption;collusion attack;attribute revocation;outsourced decryption…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14