-
2
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep.
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
0034188648
-
Tracing traitors
-
May
-
B. Chor, A. Fiat, M. Naor, and B. Pinkas, "Tracing traitors," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 893-910, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
4
-
-
15044340426
-
On the capacity game of private fingerprinting systems under collusion attacks
-
Mar.
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.3
, pp. 884-899
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
5
-
-
0025383763
-
A guided tour of Chernoff bounds
-
T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, pp. 305-308, 1990.
-
(1990)
Inf. Process. Lett.
, vol.33
, pp. 305-308
-
-
Hagerup, T.1
Rüb, C.2
-
6
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
Apr.
-
A. Barg, G. R. Blakley, and G. A. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.A.3
-
7
-
-
2642540974
-
Collusion secure codes: Systematic security definitions and their relations
-
May
-
K. Yoshioka, J. Shikata, and T. Matsumoto, "Collusion secure codes: Systematic security definitions and their relations," IEICE Trans. Fundamentals, vol. E87-A, no. 5, May 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.5
-
-
Yoshioka, K.1
Shikata, J.2
Matsumoto, T.3
-
8
-
-
33744721541
-
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
-
Information Hiding 2004, J. Fridrich, Ed.
-
H. Muratani, "Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring," in Information Hiding 2004, J. Fridrich, Ed., 2004, vol. 3200, Lecture Notes Comput. Sci., pp. 282-292.
-
(2004)
Lecture Notes Comput. Sci.
, vol.3200
, pp. 282-292
-
-
Muratani, H.1
-
9
-
-
84947944329
-
Error- and collusion-secure finger-printing for digital data
-
Proc. Information Hiding, New York Springer-Verlag
-
H.-J. Guth and B. Pfitzmann, "Error- and collusion-secure finger-printing for digital data," in Proc. Information Hiding, New York, 2000, vol. 1768, Lecture Notes Comput. Sci., pp. 134-145, Springer-Verlag.
-
(2000)
Lecture Notes Comput. Sci.
, vol.1768
, pp. 134-145
-
-
Guth, H.-J.1
Pfitzmann, B.2
-
10
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
Sep.
-
V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes," IEEE Trans. Inform. Theory, vol. 45, no. 6, pp. 1757-1767, Sep. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
11
-
-
0000377676
-
Algebraic-geometric codes and asymptotic problems
-
M. A. Tsfasman, "Algebraic-geometric codes and asymptotic problems," Discrete Appl. Math., vol. 33, no. 1-3, pp. 241-256, 1991.
-
(1991)
Discrete Appl. Math.
, vol.33
, Issue.1-3
, pp. 241-256
-
-
Tsfasman, M.A.1
-
12
-
-
21144436639
-
Fighting two pirates
-
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. New York: Springer-Verlag, May
-
H. G. Schaathun, "Fighting two pirates," in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. New York: Springer-Verlag, May 2003, vol. 2643, Lecture Notes Comput. Sci., pp. 71-78.
-
(2003)
Lecture Notes Comput. Sci.
, vol.2643
, pp. 71-78
-
-
Schaathun, H.G.1
-
13
-
-
33744770800
-
Optimal probabilistic fingerprint codes
-
To appear. In part at STOC'03
-
G. Tardos, "Optimal probabilistic fingerprint codes," J. ACM, 2005, To appear. In part at STOC'03.
-
(2005)
J. ACM
-
-
Tardos, G.1
-
14
-
-
33744727823
-
Short c-secure fingerprinting codes
-
Bristol, U.K., Oct.
-
T. Van Le, M. Burmester, and J. Hu, "Short c-secure fingerprinting codes," in Proc. 6th Information Security Conf., Bristol, U.K., Oct. 2003.
-
(2003)
Proc. 6th Information Security Conf.
-
-
Van Le, T.1
Burmester, M.2
Hu, J.3
-
15
-
-
33744754538
-
-
Prague, Czech Republic, 2003, EC-Web, Sep. 2-5
-
M. Fernandez and M. Soriano, Protecting intellectual property by guessing secrets. Prague, Czech Republic, 2003, EC-Web, Sep. 2-5, 2003.
-
(2003)
Protecting Intellectual Property by Guessing Secrets
-
-
Fernandez, M.1
Soriano, M.2
|