메뉴 건너뛰기




Volumn 3857 LNCS, Issue , 2006, Pages 193-202

A short random fingerprinting code against a small number of pirates

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER SIMULATION; PARAMETER ESTIMATION; SECURITY OF DATA;

EID: 33745654095     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11617983_19     Document Type: Conference Paper
Times cited : (15)

References (9)
  • 2
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • April
    • A. Bark, G.R. Blakley, and G.A. Kabatiansky. Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory, 49(4):852-865, April 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 852-865
    • Bark, A.1    Blakley, G.R.2    Kabatiansky, G.A.3
  • 4
    • 84974712391 scopus 로고    scopus 로고
    • A 2-secure code with efficient tracing algorithm
    • Springer-Verlag, Berlin Heidelberg New York
    • V. Dong To, R. Safavi-Naini, and Y. Wang: A 2-Secure Code with Efficient Tracing Algorithm. Lecture Notes in Computer Science, Vol. 2551. Springer-Verlag, Berlin Heidelberg New York (2002), pp. 149-163.
    • (2002) Lecture Notes in Computer Science , vol.2551 , pp. 149-163
    • Dong To, V.1    Safavi-Naini, R.2    Wang, Y.3
  • 5
    • 84945305196 scopus 로고    scopus 로고
    • Fingerprinting concatenated codes with efficient identification
    • Springer-Verlag, Berlin Heidelberg New York
    • M. Fernandez and M. Soriano: Fingerprinting Concatenated Codes with Efficient Identification. Lecture Notes in Computer Science, Vol. 2433. Springer-Verlag, Berlin Heidelberg New York (2002), pp. 459-470.
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 459-470
    • Fernandez, M.1    Soriano, M.2
  • 6
    • 5044241114 scopus 로고    scopus 로고
    • Fighting three pirates with scattering codes. Information Theory, 2004. ISIT 2004
    • June-2 July
    • H.G. Schaathun: Fighting three pirates with scattering codes. Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on Volume, Issue, 27 June-2 July 2004 Page(s): 202-.
    • (2004) Proceedings. International Symposium on , Issue.27 , pp. 202
    • Schaathun, H.G.1
  • 7
    • 33749079036 scopus 로고    scopus 로고
    • Boneh-Shaw fingerprinting and soft decision decoding
    • IEEE ITSOC ITW 2005, from Department of Informatics, UiB. January
    • H.G. Schaathun M. Fermandez: Boneh-Shaw fingerprinting and soft decision decoding. IEEE ITSOC ITW 2005, Technical report no. 289 from Department of Informatics, UiB. January 2005.
    • (2005) Technical Report No. 289 , vol.289
    • Schaathun, H.G.1    Fermandez, M.2
  • 8
    • 0038447029 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • Proceedings of the 35th Annual ACM Symposium on Theory of Computing, to appear
    • G. Tardos: Optimal Probabilistic Fingerprint Codes. Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003, pp. 116-125. Journal of the ACM, to appear.
    • (2003) Journal of the ACM , pp. 116-125
    • Tardos, G.1
  • 9
    • 33745649263 scopus 로고    scopus 로고
    • A coding method for collusion-secure watermark and less decline
    • J. Yoshida, K. Iwamura, H. Imai: A Coding Method for Collusion-Secure Watermark and Less Decline. SCIS'98.
    • SCIS'98
    • Yoshida, J.1    Iwamura, K.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.