Marcel Fernandez
Orcid: 0000-0001-7655-135X
According to our database1,
Marcel Fernandez
authored at least 65 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cryptogr. Commun., May, 2024
Theor. Comput. Sci., 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
Bounds and Constructions of Parent Identifying Schemes via the Algorithmic Version of the Lovász Local Lemma.
IEEE Trans. Inf. Theory, November, 2023
Codes for Exact Support Recovery of Sparse Vectors from Inaccurate Linear Measurements and Their Decoding.
Probl. Inf. Transm., January, 2023
A constructive approach to multimedia codes with complete traceability resistant to δ-noise.
Proceedings of the IEEE Information Theory Workshop, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
2022
A study of the separating property in Reed-Solomon codes by bounding the minimum distance.
Des. Codes Cryptogr., 2022
2020
Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise.
Probl. Inf. Transm., 2020
2019
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing.
Des. Codes Cryptogr., 2019
Proceedings of the Analysis of Experimental Algorithms - Special Event, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Constructions of almost secure frameproof codes with applications to fingerprinting schemes.
Des. Codes Cryptogr., 2018
2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Des. Codes Cryptogr., 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.
Proceedings of the Advances in Information and Computer Security, 2013
2012
Adv. Math. Commun., 2012
2011
IEEE Trans. Inf. Theory, 2011
Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
IEEE Trans. Inf. Theory, 2010
Telecommun. Syst., 2010
Comput. Secur., 2010
2009
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Proceedings of the Computer Security, 2008
Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel.
Proceedings of the Critical Information Infrastructure Security, 2008
2007
Online Inf. Rev., 2007
Tracing illegal redistribution using errors-anderasures and side information decoding algorithms.
IET Inf. Secur., 2007
Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Information Security and Cryptology, 2007
2006
Int. J. Bus. Data Commun. Netw., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the 2006 IEEE Information Theory Workshop, 2006
Proceedings of the Computational Science and Its Applications, 2006
Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Development of a platform offering video copyright protection and security against illegal distribution.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
IEEE Trans. Signal Process., 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002