메뉴 건너뛰기




Volumn 30, Issue 6, 2000, Pages 1802-1828

Efficient dynamic traitor tracing

Author keywords

Analysis of algorithms; Asymptotic complexity; Cryptography; Traitor tracing

Indexed keywords

ASYMPTOTIC STABILITY; BOUNDARY CONDITIONS; COMPUTATIONAL COMPLEXITY; COMPUTER CRIME; CRYPTOGRAPHY; DATA STRUCTURES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GRAPH THEORY; INTELLECTUAL PROPERTY; MATHEMATICAL MODELS; SECURITY OF DATA; WATERMARKING;

EID: 0035707483     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/s0097539700367984     Document Type: Article
Times cited : (15)

References (13)
  • 1
    • 84947942283 scopus 로고
    • Fingerprinting long forgiving messages
    • Proceedings of Advances in Cryptology-CRYPTO'85, Springer-Verlag, New York
    • G. R. BLAKLEV, C. MEADOWS, AND G. B. PURDY, Fingerprinting long forgiving messages, in Proceedings of Advances in Cryptology-CRYPTO'85, Lecture Notes in Comput. Sei. 218, Springer-Verlag, New York, 1985, pp. 180-189.
    • (1985) Lecture Notes in Comput. Sei. , vol.218 , pp. 180-189
    • Blaklev, G.R.1    Meadows, C.2    Purdy, G.B.3
  • 2
    • 0032162672 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. BONEH AND J. SHAW, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, 44 (1908), pp. 1897-1905.
    • (1908) IEEE Trans. Inform. Theory , vol.44 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 3
    • 84985922619 scopus 로고
    • Tracing traitors
    • Proceedings of Advances in CryptologyCRYPTO'94, Springer-Verlag, New York
    • B. CHOR, A. FIAT, AND M. NAOR, Tracing traitors, in Proceedings of Advances in CryptologyCRYPTO'94, Lecture Notes in Comput. Sei. 839, Springer-Verlag, New York, 1994, pp. 257-270.
    • (1994) Lecture Notes in Comput. Sei. , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 4
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • Information Hiding, Springer-Verlag, New York
    • I. J. Cox, J. KlLIAN, T. LEIGHTON, AND T. SHAMOON, A secure, robust watermark for multimedia, in Information Hiding, Lecture Notes in Comput. Sei. 174, Springer-Verlag, New York, 1996, pp. 185-20G.
    • (1996) Lecture Notes in Comput. Sei. , vol.174
    • Cox, I.J.1    Kllian, J.2    Leighton, T.3    Shamoon, T.4
  • 6
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Proceedings of Advances in Cryptology-CRYPTO'93, Springer-Verlag, New York
    • A. FIAT AND M. NAOR, Broadcast encryption, in Proceedings of Advances in Cryptology-CRYPTO'93, Lecture Notes in Comput. Sei. 773, Springer-Verlag, New York, 1993, pp. 480-491.
    • (1993) Lecture Notes in Comput. Sei. , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 7
    • 84957076207 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • Proceedings of Advances in CryptologyCRYPTO'99, Springer-Verlag, New York
    • A. FIAT AND T. TASSA, Dynamic traitor tracing, in Proceedings of Advances in CryptologyCRYPTO'99, Lecture Notes in Comput. Sei. 16GG, Springer-Verlag, New York, 1999, pp. 354-371.
    • (1999) Lecture Notes in Comput. Sei. 16GG , pp. 354-371
    • Fiat, A.1    Tassa, T.2
  • 8
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • Proceedings of Advances in Cryptology-CRYPTO'98, Springer-Verlag, New York
    • M. NAOR. AND B. PlNKAS, Threshold traitor tracing, in Proceedings of Advances in Cryptology-CRYPTO'98, Lecture Notes in Comput. Sei. 1462, Springer-Verlag, New York, 1998, pp. 502-517.
    • (1998) Lecture Notes in Comput. Sei. , vol.1462 , pp. 502-517
    • Naor, M.1    Plnkas, B.2
  • 9
    • 84954420982 scopus 로고    scopus 로고
    • Trials of traced traitors
    • Information Hiding, Springer-Verlag, New York
    • B. PFITZMANN, Trials of traced traitors, in Information Hiding, Lecture Notes in Comput. Sei. 1174, Springer-Verlag, New York, 1996, pp. 49-64.
    • (1996) Lecture Notes in Comput. Sei. , vol.1174 , pp. 49-64
    • Pfitzmann, B.1
  • 10
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. R. STINSON AND R. WEI, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM J. Discrete Math., 11 (1998), pp. 41-53.
    • (1998) SIAM J. Discrete Math. , vol.11 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 11
    • 0008243295 scopus 로고    scopus 로고
    • Tracing Traitors Using Finite Geometries
    • Deutsche Telekom AG
    • J. SCHWENK AND J. UEBERBERG, Tracing Traitors Using Finite Geometries, Technical report, Deutsche Telekom AG, 1997
    • (1997) Technical Report
    • Schwenk, J.1    Ueberberg, J.2
  • 12
    • 0001263144 scopus 로고
    • On an extremal problem in graph theory
    • P. TURÄN, On an extremal problem in graph theory, Math. Fiz. Lapok, 48 (1941), pp. 436-452.
    • (1941) Math. Fiz. Lapok , vol.48 , pp. 436-452
    • Turän, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.