메뉴 건너뛰기




Volumn 18, Issue 2, 2005, Pages 167-183

Low bandwidth dynamic traitor tracing schemes

Author keywords

Binary codes; Broadcast encryption; Fingerprinting; On line algorithms; Pay TV; Traitor tracing; Watermarking

Indexed keywords

ALGORITHMS; BINARY CODES; DIGITAL WATERMARKING; SECURITY OF DATA; SUBSCRIPTION TELEVISION; TELEVISION BROADCASTING;

EID: 17444400933     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-004-0214-z     Document Type: Article
Times cited : (14)

References (13)
  • 2
    • 0035707483 scopus 로고    scopus 로고
    • Efficient dynamic traitor tracing
    • O. Berkman, M. Parnas and J. Sgall, Efficient Dynamic Traitor Tracing, SIAM Journal on Computing, vol. 30, no. 6 (2001), pp. 1802-1828. See also Proc. 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 2000), pp. 586-595.
    • (2001) SIAM Journal on Computing , vol.30 , Issue.6 , pp. 1802-1828
    • Berkman, O.1    Parnas, M.2    Sgall, J.3
  • 4
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897-1905. See also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 5
    • 0032162672 scopus 로고    scopus 로고
    • LNCS 963, Springer-Verlag, Berlin
    • D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897-1905. See also Proc. Crypto 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452-465.
    • (1995) Proc. Crypto 95 , pp. 452-465
  • 6
    • 84985922619 scopus 로고
    • Tracing traitors
    • LNCS 839, Springer-Verlag, Berlin, For a full version see [5]
    • B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 257-270. For a full version see [5].
    • (1994) Proc. Crypto 94 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 8
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • LNCS 174, Springer-Verlag, Berlin
    • U. Cox, J. Kilian, T. Leighton and T. Shamoon, A Secure, Robust Watermark for Multimedia, in Information Hiding, LNCS 174, Springer-Verlag, Berlin, 1996, pp. 185-226.
    • (1996) Information Hiding , pp. 185-226
    • Cox, U.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 9
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • A. Fiat and T. Tassa, Dynamic Traitor Tracing, Journal of Cryptology, vol. 14, no. 3 (2001), pp. 211-223. See also Proc. Crypto 99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 537-554.
    • (2001) Journal of Cryptology , vol.14 , Issue.3 , pp. 211-223
    • Fiat, A.1    Tassa, T.2
  • 10
    • 0013138808 scopus 로고    scopus 로고
    • LNCS 1666, Springer-Verlag, Berlin
    • A. Fiat and T. Tassa, Dynamic Traitor Tracing, Journal of Cryptology, vol. 14, no. 3 (2001), pp. 211-223. See also Proc. Crypto 99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 537-554.
    • (1999) Proc. Crypto 99 , pp. 537-554
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • LNCS 1109, Springer-Verlag, Berlin
    • P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proc. Crypto 96. LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
    • (1996) Proc. Crypto 96 , pp. 104-113
    • Kocher, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.