Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michael Malkin
@phdthesis{DBLP:phd/us/Malkin06, author = {Michael Malkin}, title = {Cryptographic methods in multimedia identification and authentication}, school = {Stanford University, {USA}}, year = {2006}, url = {https://searchworks.stanford.edu/view/6690152}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Malkin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MalkinK06, author = {Michael Malkin and Ton Kalker}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {A Cryptographic Method for Secure Watermark Detection}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {26--41}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_3}, doi = {10.1007/978-3-540-74124-4\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/MalkinK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KalkerM06, author = {Ton Kalker and Michael Malkin}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {Secure Quantization Index Modulation Watermark Detection}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {16--18}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_2}, doi = {10.1007/11922841\_2}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KalkerM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/MalkinV05, author = {Michael Malkin and Ramarathnam Venkatesan}, editor = {Rajkumar Buyya and Paul D. Coddington and Paul Montague and Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard and Andrew L. Wendelborn}, title = {Comparison of Texts Streams in the Presence of Mild Adversaries}, booktitle = {{ACSW} Frontiers 2005, 2005 {ACSW} Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop {(AISW} 2005), Newcastle, NSW, Australia, January/February 2005}, series = {{CRPIT}}, volume = {44}, pages = {179--186}, publisher = {Australian Computer Society}, year = {2005}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV44Malkin.html}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/MalkinV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoreMSB03, author = {Sara Miner More and Michael Malkin and Jessica Staddon and Dirk Balfanz}, editor = {Peng Liu and Partha P. Pal}, title = {Sliding-window self-healing key distribution}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Survivable and Self-Regenerative Systems, in Association with 10th {ACM} Conference on Computer and Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October 31, 2003}, pages = {82--90}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1036921.1036930}, doi = {10.1145/1036921.1036930}, timestamp = {Fri, 20 Jan 2023 16:46:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoreMSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StaddonMFBMD02, author = {Jessica Staddon and Sara K. Miner and Matthew K. Franklin and Dirk Balfanz and Michael Malkin and Drew Dean}, title = {Self-Healing Key Distribution with Revocation}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {241--257}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004375}, doi = {10.1109/SECPRI.2002.1004375}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/StaddonMFBMD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MalkinWB99, author = {Michael Malkin and Thomas D. Wu and Dan Boneh}, title = {Experimenting with Shared Generation of {RSA} Keys}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/experimenting-shared-generation-rsa-keys/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MalkinWB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuMB99, author = {Thomas D. Wu and Michael Malkin and Dan Boneh}, editor = {G. Winfield Treese}, title = {Building Intrusion-Tolerant Applications}, booktitle = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC, USA, August 23-26, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/8th-usenix-security-symposium/building-intrusion-tolerant-applications}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/WuMB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.