메뉴 건너뛰기




Volumn E87-A, Issue 5, 2004, Pages 1162-1171

Collusion secure codes: Systematic security definitions and their relations

Author keywords

Collusion secure code; Fingerprinting; Traitor tracing

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); CRYPTOGRAPHY; DATA REDUCTION; DECODING; DIGITAL WATERMARKING; MATHEMATICAL MODELS; SET THEORY; THEOREM PROVING;

EID: 2642540974     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (10)
  • 1
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital-data
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital-data," IEEE Trans. Inf. Theory, vol.44, no.5, pp.1897-1905, 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 2
    • 84985922619 scopus 로고
    • Tracing traitors
    • Advances in Cryptology - CRYPTO'94
    • B. Chor, A. Fiat, and M. Naor, "Tracing traitors," Advances in Cryptology - CRYPTO'94, LNCS, vol.839, pp.480-491, 1994.
    • (1994) LNCS , vol.839 , pp. 480-491
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 3
    • 84947944329 scopus 로고    scopus 로고
    • Error- and collusion-secure fingerprinting for digital data
    • Proc. Third International Workshop, Information Hiding, IH'99, Springer-Verlag
    • H. Guth and B. Pfltzmann, "Error- and collusion-secure fingerprinting for digital data," Proc. Third International Workshop, Information Hiding, IH'99, LNCS, vol.1768, pp.134-145, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1768 , pp. 134-145
    • Guth, H.1    Pfltzmann, B.2
  • 5
    • 84947297384 scopus 로고    scopus 로고
    • A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience
    • Proc. Fourth Information Hiding Workshop, IHW 2001, Springer-Verlag
    • H. Muratani, "A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience," Proc. Fourth Information Hiding Workshop, IHW 2001, LNCS, vol.2137, pp.303-315, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2137 , pp. 303-315
    • Muratani, H.1
  • 6
    • 0142007201 scopus 로고    scopus 로고
    • New security index for digital fingerprinting and its bounds
    • May
    • S. Orihara, T. Mizuki, and T. Nishizeki, "New security index for digital fingerprinting and its bounds," IEICE Trans. Fundamentals, vol.E86-A, no.5, pp.1156-1163, May 2003.
    • (2003) IEICE Trans. Fundamentals , vol.E86-A , Issue.5 , pp. 1156-1163
    • Orihara, S.1    Mizuki, T.2    Nishizeki, T.3
  • 7
    • 84959043688 scopus 로고    scopus 로고
    • Collusion secure q-ary fingerprinting for perceptual content
    • Security and Privacy in Digital Rights Management, SPDRM'01
    • R. Safavi-Naini and Y. Wang, "Collusion secure q-ary fingerprinting for perceptual content," Security and Privacy in Digital Rights Management, SPDRM'01, LNCS, vol.2320, pp.57-75, 2002.
    • (2002) LNCS , vol.2320 , pp. 57-75
    • Safavi-Naini, R.1    Wang, Y.2
  • 8
    • 0035270516 scopus 로고    scopus 로고
    • Combinatorial properties of frameproof and traceability codes
    • J.N. Staddon, D.R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes;" IEEE Trans. Inf. Theory, vol.47, no.3, pp.1042-1049, 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1042-1049
    • Staddon, J.N.1    Stinson, D.R.2    Wei, R.3
  • 9
    • 0000137420 scopus 로고    scopus 로고
    • Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
    • D.R. Stinson, T. van Trung, and R. Wei, "Secure frameproof codes, key distribution patterns, group testing algorithms and related structures," J. Stat. Plan. Inference, vol.86, no.2, pp.595-617, 2000.
    • (2000) J. Stat. Plan. Inference , vol.86 , Issue.2 , pp. 595-617
    • Stinson, D.R.1    Van Trung, T.2    Wei, R.3
  • 10
    • 2642547142 scopus 로고    scopus 로고
    • Systematic treatment of collusion secure codes: Security definitions and their relations
    • Proc. 6th Information Security Conference, ISC'03, Springer-Verlag
    • K. Yoshioka, J. Shikata, and T. Matsumoto, "Systematic treatment of collusion secure codes: Security definitions and their relations," Proc. 6th Information Security Conference, ISC'03, LNCS, vol.2851, pp.408-421, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2851 , pp. 408-421
    • Yoshioka, K.1    Shikata, J.2    Matsumoto, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.