|
[1]Tae, H. R., Cheol, K. A., and Ingoo, H., 2005, "The priority factor model for customer relationship management system success," Expert Systems with Applications, Volume 28, Issue 4, pp.641–654. [2]George, S. D., 1994, "The capabilities of market-driven organizations," Journal of Marketing, Volume 58, Issue 4, pp.37-52. [3]Sheehan, K. B., Hoy, M. G., 1999, "Flaming, complaining, abstaining: how online users respond to privacy concerns," Journal of Advertising, Volume 28, Issue 3, pp.37-51. [4]Wang, P., Petrison, L. A., 1993, "Direct marketing activities and personal privacy," Journal of Direct Marketing, Volume 7, Issue 1, pp.7-19. [5]Chaum. D., 1985, "Security without identification: Transaction systems to make big brother obsolete," Communications of the ACM, Volume 28, Issue 10, pp.1030-1044. [6]Aiello, W., Ishai, Y., and Reingold, O., 2001, "Priced oblivious transfer: How to sell digital goods," In Birgit Pfitzmann, editor, Advances in Cryptology-EUROCRYPT, Volume 2045, pp.119-135. [7]Rial, A., Kohlweiss, M., and Preneel, B., 2009, "Universally composable adaptive priced oblivious transfer," In Pairing, ser. Lecture Notes in Computer Science, Volume 5671, pp.231-247. [8]Rial, A., Balasch, J., and Preneel,B., 2011, "A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer," Information Forensics and Security, IEEE Transactions on, Volume 6, Issue 1, pp.202-212. [9]Celik, M. U. et al., 2005, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, Volume 14, Issue 2, pp.253-266. [10]Wang, C. C., Tai, S. C., and Yu, C. S., 2000, "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals, Volume E83-A, Issue 8, pp.1589-1598. [11]Hsieh, S. L., and Huang, B. Y., 2004, "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," Proceedings of International Computer Symposium, pp.661-666. [12]Chang, C. C., and Chung, J. C., "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy," Pattern Recognition Letters, Volume 23, Issue 8, 2002, pp.931-941. [13]Lou, D. C., Tso, H. K., and Liu, J. L. "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards & Interfaces, Volume 29, Issue 1, 2007, pp.125-131. [14]Rabin, M. O. "How to exchange secrets by oblivious transfer, " ACM Transactions of Computer Systems, Volume 1, issue 20, 1983, pp. 175-193. [15]Wakaha, O. and Ryota, S. "k out of n oblivious transfer without random oracle," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E87-A, issue 1, 2004, pp. 147-151. [16]Hartung, F., and Kutter, M. "Multimedia watermarking techniques," Proceedings of the IEEE, Volume 87, Issue 7, 1999, pp.1079-1107. [17]Naor, M., and Shamir, A. "Visual cryptography,” Advances in cryptology-EUROCRYPT ''94, 1998, pp.1-12. [18]Wang, C. C., Tai, S. C., and Yu, C. S. "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals, Volume E83-A, Issue 2000, pp.1589-1598. [19]Wang, Y., Doherty, J. F., and Van Dyck, R. E. "A wavelet-based watermarking algorithm for ownership verification of digital images," IEEE Transactions on Image Processing, Volume 11, Issue 2, 2002, pp.77–88. [20]Chen, T. H. and Tsai, D. S. "Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol," Pattern Recognition, Volume 39, Issue 8, 2006, pp.1530-1541. [21]Rial, A., and Preneel, B. "Optimistic fair priced oblivious transfer," In Proceedings of AFRICACRYPT., Volume 6055, 2010, pp.131–147. [22]Hu, M. C., Lou, D. C., and Chang, M. C. "Dual-wrapped digital watermarking scheme for image copyright protection," Computers & Security, Volume 26, Issue 4, 2007, pp.319-330. [23]Lou, D. C., Tso, H. K., and Liu, J. L. "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards & Interfaces, volume 29, issue 1, 2007, pp.125-131. [24]Desmedt, Y., Hou, S., and Quisquater, J. J. "Audio and Optical Cryptography," Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology, 1998, pp.392-404. [25]Lin, C. C., Laih, C. S., and Yang, C. N. "New Audio Secret Sharing Schemes With Time Division Technique," Journal of Information Science and Engineering, 2003, pp.605-614. [26]Socek, D., and Magliveras, S. S. "General access structures in audio cryptography," Electro Information Technology, 2005 IEEE International Conference on, 2005, pp.-6. [27]Thomas, T. et al., "Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture," Information Forensics and Security, IEEE Transactions on, volume 4, issue 4, 2009, pp.758-767. [28]Hsieh S.L., Huang B.Y., "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," Proceedings of International Computer Symposium, 2004, pp. 661-666. [29]Rachel R. "7 Reasons Distributors Should Get Into Ecommerce in 2011" http://www.info.insitesoft.com/Insite-Software-Blog/bid/58357/7-Reasons-Distributors-Should-Get-Into-Ecommerce-in-2011, 2011.
|