Jeffery Lotspiech
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
24 | EE | Hongxia Jin, Jeffrey B. Lotspiech: Defending against the Pirate Evolution Attack. ISPEC 2009: 147-158 |
2008 | ||
23 | EE | Hongxia Jin, Jeffrey B. Lotspiech, Michael Nelson, Nimrod Megiddo: Adaptive traitor tracing for large anonymous attack. Digital Rights Management Workshop 2008: 1-8 |
22 | EE | Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo: Efficient Coalition Detection in Traitor Tracing. SEC 2008: 365-380 |
2007 | ||
21 | EE | Hongxia Jin, Jeffery Lotspiech: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. ESORICS 2007: 563-577 |
2006 | ||
20 | EE | Hongxia Jin, Jeffery Lotspiech: Hybrid Traitor Tracing. ICME 2006: 1329-1332 |
19 | EE | Hongxia Jin, Jeffery Lotspiech: Practical Forensic Analysis in Advanced Access Content System. ISPEC 2006: 302-313 |
18 | Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum: Traitor Tracing for Subscription-Based Systems. SECRYPT 2006: 223-228 | |
2005 | ||
17 | EE | Hongxia Jin, Jeffery Lotspiech: Flexible Traitor Tracing for Anonymous Attacks. Communications and Multimedia Security 2005: 269-270 |
16 | EE | Hongxia Jin, Jeffery Lotspiech: Attacks and Forensic Analysis for Multimedia Content Protection. ICME 2005: 1392-1395 |
15 | EE | Hongxia Jin, Ginger Myles, Jeffery Lotspiech: Towards Better Software Tamper Resistance. ISC 2005: 417-430 |
2004 | ||
14 | EE | Hongxia Jin, Jeffery Lotspiech, Stefan Nusser: Traitor tracing for prerecorded and recordable media. Digital Rights Management Workshop 2004: 83-90 |
13 | Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proceedings of the IEEE 92(6): 898-909 (2004) | |
2003 | ||
12 | EE | Hongxia Jin, Jeffery Lotspiech: Proactive Software Tampering Detection. ISC 2003: 352-365 |
11 | EE | Hongxia Jin, Jeffery Lotspiech: Forensic Analysis for Tamper Resistant Software. ISSRE 2003: 133-142 |
2002 | ||
10 | EE | Dalit Naor, Moni Naor, Jeffery Lotspiech: Revocation and Tracing Schemes for Stateless Receivers Electronic Colloquium on Computational Complexity (ECCC)(043): (2002) |
9 | EE | Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni: Broadcast Encryption's Bright Future. IEEE Computer 35(8): 57-63 (2002) |
2001 | ||
8 | EE | Dalit Naor, Moni Naor, Jeffery Lotspiech: Revocation and Tracing Schemes for Stateless Receivers. CRYPTO 2001: 41-62 |
1998 | ||
7 | Ulrich Kohl, Jeffrey B. Lotspiech, Stefan Nusser: Security for the Digital Library - Protecting Documents Rather than Channels. DEXA Workshop 1998: 316-321 | |
1997 | ||
6 | EE | Ulrich Kohl, Jeffrey B. Lotspiech, Marc A. Kaplan: Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels. D-Lib Magazine 3(9): (1997) |
1996 | ||
5 | David M. Choy, Cynthia Dwork, Jeffrey B. Lotspiech, Laura C. Anderson, Stephen K. Boyer, Richard Dievendorff, Thomas D. Griffin, Bruce A. Hoenig, M. J. Jackson, W. Kaka, James M. McCrossin, Alex M. Miller, Robert J. T. Morris, Norman J. Pass: A Digital Library System for Periodicals Distribution. ADL 1996: 95-103 | |
4 | EE | Cynthia Dwork, Jeffrey B. Lotspiech, Moni Naor: Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version). STOC 1996: 489-498 |
1995 | ||
3 | David M. Choy, Richard Dievendorff, Cynthia Dwork, Jeffrey B. Lotspiech, Robert J. T. Morris, Norman J. Pass, Laura C. Anderson, Alan E. Bell, Stephen K. Boyer, Thomas D. Griffin, Bruce A. Hoenig, James M. McCrossin, Alex M. Miller, Florian Pestoni, Deidra S. Picciano: The Almaden Distributed Digital Library System. ADL 1995: 203-220 | |
1992 | ||
2 | Yitzhak Birk, Jeffrey B. Lotspiech: On Finding Non-Intersecting Straightline Connections of Grid Points to the Boundary. J. Algorithms 13(4): 636-656 (1992) | |
1991 | ||
1 | Yitzhak Birk, Jeffrey B. Lotspiech: A Fast Algorithm for Connecting Grid Points to the Boundary with Nonintersecting Straight Lines. SODA 1991: 465-474 |
1 | Laura C. Anderson | [3] [5] |
2 | Alan E. Bell | [3] |
3 | Yitzhak Birk | [1] [2] |
4 | Mario Blaum | [18] |
5 | Stephen K. Boyer | [3] [5] |
6 | David M. Choy | [3] [5] |
7 | Richard Dievendorff | [3] [5] |
8 | Cynthia Dwork | [3] [4] [5] |
9 | Thomas D. Griffin | [3] [5] |
10 | Bruce A. Hoenig | [3] [5] |
11 | M. J. Jackson | [5] |
12 | Hongxia Jin | [11] [12] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] |
13 | W. Kaka | [5] |
14 | Marc A. Kaplan | [6] |
15 | Ulrich Kohl | [6] [7] |
16 | James M. McCrossin | [3] [5] |
17 | Nimrod Megiddo | [22] [23] |
18 | Alex M. Miller | [3] [5] |
19 | Robert J. T. Morris | [3] [5] |
20 | Ginger Myles | [15] |
21 | Dalit Naor | [8] [10] |
22 | Moni Naor | [4] [8] [10] |
23 | Michael Nelson | [23] |
24 | Stefan Nusser | [7] [9] [13] [14] |
25 | Norman J. Pass | [3] [5] |
26 | Florian Pestoni | [3] [9] [13] |
27 | Deidra S. Picciano | [3] |