Fingerprinting schemes embed a fingerprinting sequence in a
digital object to construct an individualized version for each buyer.
A c-secure fingerprinting system can be used to identify at least
one of the colluders if a pirate object is constructed by a collusion
of up to c colluders. A ‘marking assumption’ determines possible
pirate objects (fingerprints) that the colluders can construct. We review
existing marking assumptions and their corresponding fingerprint codes,
and propose an extension that reflects the attack where the colluders
remove part of the object.
The facilitator of this program is Reihaneh Safavi-Naini of the University of Wollongong.
Edward J. Delp, Professor of Electrical Engineering and Professor of Biomedical Engineering, has received an honorary doctorate from the Tampere University of Technology. Delp’s citation states:
CERIAS’ CIRDB project has been recommended by the The Open Web Application Security Project’s Guide to Building Secure Web Applications.
The free vulnerability notification service Cassandra is now serving
relevant Secunia advisories, without any extra work from users.
Papers are now being accepted for the 4th Annual IEEE Information Assurance workshop that will be held at West Point this coming June. If you are interested in submitting a paper, the suspense is 12 February. Registration will begin in mid-February.
Cisco Systems, Inc., the worldwide leader in networking for the Internet, announced last week that it has joined with the Center for Education and Research in Information Assurance and Security (CERIAS) to award two scholarships to students studying information assurance or security at Purdue University, in West Lafayette, Indiana.
This inter-disciplinary and multi-disciplinary conference marks the continuation of a project launched in 2002 to provide a challenging forum for the examination and evaluation of the nature, purpose and experience of war, and its impacts on all aspects of communities across the world.