-
2
-
-
0035707483
-
Efficient dynamic traitor tracing
-
O. Berkman, M. Parnas and J. Sgall, Efficient Dynamic Traitor Tracing, SIAM Journal on Computing, vol. 30, no. 6 (2001), pp. 1802-1828. See also Proc. 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 2000), pp. 586-595.
-
(2001)
SIAM Journal on Computing
, vol.30
, Issue.6
, pp. 1802-1828
-
-
Berkman, O.1
Parnas, M.2
Sgall, J.3
-
3
-
-
0035707483
-
-
O. Berkman, M. Parnas and J. Sgall, Efficient Dynamic Traitor Tracing, SIAM Journal on Computing, vol. 30, no. 6 (2001), pp. 1802-1828. See also Proc. 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 2000), pp. 586-595.
-
Proc. 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 2000)
, pp. 586-595
-
-
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897-1905. See also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0032162672
-
-
LNCS 963, Springer-Verlag, Berlin
-
D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897-1905. See also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
-
(1995)
Proc. Crypto 95
, pp. 452-465
-
-
-
6
-
-
84985922619
-
Tracing traitors
-
LNCS 839, Springer-Verlag, Berlin, For a full version see [5]
-
B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 257-270. For a full version see [5].
-
(1994)
Proc. Crypto 94
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
0034188648
-
Tracing traitors
-
B. Chor, A. Fiat, M. Naor and B. Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, vol. 46, no. 3 (2000), pp. 893-910.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
8
-
-
84947937393
-
A secure, robust watermark for multimedia
-
LNCS 174, Springer-Verlag, Berlin
-
U. Cox, J. Kilian, T. Leighton and T. Shamoon, A Secure, Robust Watermark for Multimedia, in Information Hiding, LNCS 174, Springer-Verlag, Berlin, 1996, pp. 185-226.
-
(1996)
Information Hiding
, pp. 185-226
-
-
Cox, U.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
0013138808
-
Dynamic traitor tracing
-
A. Fiat and T. Tassa, Dynamic Traitor Tracing, Journal of Cryptology, vol. 14, no. 3 (2001), pp. 211-223. See also Proc. Crypto 99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 537-554.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.3
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
10
-
-
0013138808
-
-
LNCS 1666, Springer-Verlag, Berlin
-
A. Fiat and T. Tassa, Dynamic Traitor Tracing, Journal of Cryptology, vol. 14, no. 3 (2001), pp. 211-223. See also Proc. Crypto 99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 537-554.
-
(1999)
Proc. Crypto 99
, pp. 537-554
-
-
-
11
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
LNCS 1109, Springer-Verlag, Berlin
-
P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proc. Crypto 96. LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
-
(1996)
Proc. Crypto 96
, pp. 104-113
-
-
Kocher, P.1
|