-
1
-
-
84947942283
-
Finger-printing long forgiving messages
-
Springer-Verlag Berlin, Heidelberg
-
G. R. Blakley, C. Meadows and G. B. Purdy, Finger-printing long forgiving messages, Proc. of Crypto '85 Springer-Verlag Berlin, Heidelberg, 1985, pp. 180-189.
-
(1985)
Proc. of Crypto '85
, pp. 180-189
-
-
Blakley, G.R.1
Meadows, C.2
Purdy, G.B.3
-
2
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Springer-Verlag, Berlin, Heidelberg
-
D. Boneh and M. Franklin, An efficient public key traitor tracing scheme, Proc. of Crypto '99 Springer-Verlag, Berlin, Heidelberg, 1999, pp. 338-353.
-
(1999)
Proc. of Crypto '99
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0038384378
-
Guessing secrets
-
F. Chung, R. Graham, T. Leighton, Guessing secrets, Electronic Journal of Combinatorics 8 (1), 2001.
-
(2001)
Electronic Journal of Combinatorics
, vol.8
, Issue.1
-
-
Chung, F.1
Graham, R.2
Leighton, T.3
-
5
-
-
84985922619
-
Tracing traitors
-
LNCS, Springer-Verlag Berlin, Heidelberg
-
B. Chor, A. Fiat and M. Naor, Tracing traitors, Proc. of Crypto'94 LNCS 839, Springer-Verlag Berlin, Heidelberg, 1994, pp. 257-270.
-
(1994)
Proc. of Crypto'94
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
6
-
-
84947944329
-
Error- and collusion-secure fingerprinting for digital data
-
LNCS, Springer-Verlag, Berlin
-
J. Guth and B. Pfitzmann, Error- and collusion-secure fingerprinting for digital data, Information Hiding (IH '99) LNCS 1768, Springer-Verlag, Berlin 2000, pp. 134-145.
-
(2000)
Information Hiding (IH '99)
, vol.1768
, pp. 134-145
-
-
Guth, J.1
Pfitzmann, B.2
-
7
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
J. Kilian, T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, F. Zane, Resistance of digital watermarks to collusive attacks, in: Proceedings of 1998 IEEE International Symposium on Information Theory.
-
Proceedings of 1998 IEEE International Symposium on Information Theory
-
-
Kilian, J.1
Leighton, T.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
8
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
LNCS, Springer, Berlin
-
K. Kurosawa and Y. Desmedt, Optimum traitor tracing and asymmetric schemes, Advances in cryptology-EUROCRYPT'98LNCS 1403, Springer, Berlin, 1998, pp. 145-157.
-
(1998)
Advances in Cryptology-EUROCRYPT'98
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
11
-
-
0003321399
-
Probability theory
-
North-Holland Publishing Co., Amsterdam, London; American Elsevier Publishing Co., Inc., New York
-
A. Rényi, Probability theory, North-Holland Series in Applied Mathematics and Mechanics, Vol. 10. North-Holland Publishing Co., Amsterdam, London; American Elsevier Publishing Co., Inc., New York, 1970.
-
(1970)
North-Holland Series in Applied Mathematics and Mechanics
, vol.10
-
-
Rényi, A.1
-
12
-
-
84974601983
-
Sequential traitor tracing
-
LNCS, Springer-Verlag Berlin, Heidelberg
-
R. Safavi-Naini and Y. Wang, Sequential traitor tracing, Proc. of Crypto'2000, LNCS 1880, Springer-Verlag Berlin, Heidelberg, 2000, pp.316-332.
-
(2000)
Proc. of Crypto'2000
, vol.1880
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
13
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
J. N. Staddon, D. R. Stinson, R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Transactions of Information Theory 47 (2001), 1042-1049.
-
(2001)
IEEE Transactions of Information Theory
, vol.47
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
|