-
1
-
-
0032162672
-
Collusion-secure fingerprinting for digital-data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital-data," IEEE Trans. Inf. Theory, vol.44, no.5, pp.1897-1905, 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
2
-
-
84985922619
-
Tracing traitors
-
Advances in Cryptology - CRYPTO'94
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," Advances in Cryptology - CRYPTO'94, LNCS, vol.839, pp.480-491, 1994.
-
(1994)
LNCS
, vol.839
, pp. 480-491
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
3
-
-
84947944329
-
Error- and collusion-secure fingerprinting for digital data
-
Proc. Third International Workshop, Information Hiding, IH'99, Springer-Verlag
-
H. Guth and B. Pfltzmann, "Error- and collusion-secure fingerprinting for digital data," Proc. Third International Workshop, Information Hiding, IH'99, LNCS, vol.1768, pp.134-145, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1768
, pp. 134-145
-
-
Guth, H.1
Pfltzmann, B.2
-
4
-
-
0000678814
-
On codes with the identifiable parent property
-
H.D.L. Hollmann, J.H. van Lint, J.-P. Linnartz, and L.M.G.M. Tolhuizen, "On codes with the identifiable parent property," J. Comb. Theory, vol.A82, pp.121-133, 1998.
-
(1998)
J. Comb. Theory
, vol.A82
, pp. 121-133
-
-
Hollmann, H.D.L.1
Van Lint, J.H.2
Linnartz, J.-P.3
Tolhuizen, L.M.G.M.4
-
5
-
-
84947297384
-
A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience
-
Proc. Fourth Information Hiding Workshop, IHW 2001, Springer-Verlag
-
H. Muratani, "A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience," Proc. Fourth Information Hiding Workshop, IHW 2001, LNCS, vol.2137, pp.303-315, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 303-315
-
-
Muratani, H.1
-
6
-
-
0142007201
-
New security index for digital fingerprinting and its bounds
-
May
-
S. Orihara, T. Mizuki, and T. Nishizeki, "New security index for digital fingerprinting and its bounds," IEICE Trans. Fundamentals, vol.E86-A, no.5, pp.1156-1163, May 2003.
-
(2003)
IEICE Trans. Fundamentals
, vol.E86-A
, Issue.5
, pp. 1156-1163
-
-
Orihara, S.1
Mizuki, T.2
Nishizeki, T.3
-
7
-
-
84959043688
-
Collusion secure q-ary fingerprinting for perceptual content
-
Security and Privacy in Digital Rights Management, SPDRM'01
-
R. Safavi-Naini and Y. Wang, "Collusion secure q-ary fingerprinting for perceptual content," Security and Privacy in Digital Rights Management, SPDRM'01, LNCS, vol.2320, pp.57-75, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 57-75
-
-
Safavi-Naini, R.1
Wang, Y.2
-
8
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
J.N. Staddon, D.R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes;" IEEE Trans. Inf. Theory, vol.47, no.3, pp.1042-1049, 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
9
-
-
0000137420
-
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
-
D.R. Stinson, T. van Trung, and R. Wei, "Secure frameproof codes, key distribution patterns, group testing algorithms and related structures," J. Stat. Plan. Inference, vol.86, no.2, pp.595-617, 2000.
-
(2000)
J. Stat. Plan. Inference
, vol.86
, Issue.2
, pp. 595-617
-
-
Stinson, D.R.1
Van Trung, T.2
Wei, R.3
-
10
-
-
2642547142
-
Systematic treatment of collusion secure codes: Security definitions and their relations
-
Proc. 6th Information Security Conference, ISC'03, Springer-Verlag
-
K. Yoshioka, J. Shikata, and T. Matsumoto, "Systematic treatment of collusion secure codes: Security definitions and their relations," Proc. 6th Information Security Conference, ISC'03, LNCS, vol.2851, pp.408-421, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2851
, pp. 408-421
-
-
Yoshioka, K.1
Shikata, J.2
Matsumoto, T.3
|