-
1
-
-
33746014418
-
-
R. Andersen, M. Kühn, Tamper Resistance - a Cautionary Note, 2nd USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996, pp. 1-11.
-
Tamper Resistance - a Cautionary Note, 2nd USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996, Pp. 1-11.
-
-
Andersen, R.1
Kühn, M.2
-
2
-
-
0035707483
-
Efficient Dynamic Traitor Tracing
-
O. Berkman, M. Pâmas and J. Sgall, Efficient Dynamic Traitor Tracing, Proc. llr/i Annual ACMSIAM Symposium on Discrete Algorithms (SODA), (2000), pp. 586-595. To appear in SIAM Journal of Computing.
-
Proc. Llr/i Annual ACMSIAM Symposium on Discrete Algorithms (SODA), (2000), Pp. 586-595. to Appear in SIAM Journal of Computing.
-
-
Berkman, O.1
Pâmas, M.2
Sgall, J.3
-
3
-
-
84957085257
-
-
D. Boneh and M. Franklin, An Efficient Public Key Traitor Tracing Scheme, Proc. Crypto '99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 338-353.
-
An Efficient Public Key Traitor Tracing Scheme, Proc. Crypto '99, LNCS 1666, Springer-Verlag, Berlin, 1999, Pp. 338-353.
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0032162672
-
Collusion-Secure Fingerprinting for Digital Data
-
D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897-1905 (see also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452-465).
-
IEEE Transactions on Information Theory, Vol. 44, No. 5 (1998), Pp. 1897-1905 (See also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, Pp. 452-465).
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0032661699
-
Multicast Security: A Taxonomy and Efficient Constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, Multicast Security: A Taxonomy and Efficient Constructions, Proc. oflNFOCOM '99, vol. 2, New York, March 1999, pp. 70S-716.
-
Proc. OflNFOCOM '99, Vol. 2, New York, March 1999, Pp. 70S-716.
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
84985922619
-
Tracing Traitors
-
B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 257-270. For a full version see [7].
-
Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin, 1994, Pp. 257-270. for a Full Version See [7].
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
0034188648
-
Tracing Traitors
-
B. Chor, A. Fiat, M. Naor, and B. Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, vol. 46, no. 3 (2000).
-
IEEE Transactions on Information Theory, Vol. 46, No. 3 (2000).
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
8
-
-
84947937393
-
A Secure, Robust Watermark for Multimedia
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, A Secure, Robust Watermark for Multimedia, Infor-mation Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 185-226.
-
Infor-mation Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, Pp. 185-226.
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
84979291225
-
Broadcast Encryption
-
A. Fiat and M. Naor, Broadcast Encryption, Proc. Crypto 93, LNCS 773, Springer-Verlag, Berlin, 1993, pp. 480-491.
-
Proc. Crypto 93, LNCS 773, Springer-Verlag, Berlin, 1993, Pp. 480-491.
-
-
Fiat, A.1
Naor, M.2
-
13
-
-
84957617696
-
Threshold Traitor Tracing
-
M. Naor and B. Pinkas, Threshold Traitor Tracing, Proc. Crypto 98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 502-517.
-
Proc. Crypto 98, LNCS 1462, Springer-Verlag, Berlin, 1998, Pp. 502-517.
-
-
Naor, M.1
Pinkas, B.2
-
14
-
-
84954420982
-
Trials of Traced Traitors
-
B. Pfitzmann, Trials of Traced Traitors, Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 49-64.
-
Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, Pp. 49-64.
-
-
Pfitzmann, B.1
|