-
1
-
-
84979291225
-
Broadcast encryption
-
A. Fiat and M. Naor, "Broadcast encryption," in Crypto 1993, Lecture Notes in computer science, 1993, vol. 773, pp. 480-491.
-
(1993)
Crypto 1993, Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M.Naor, and J.Lotspiech, "Revocation and tracing schemes for stateless receivers," in Crypto 2001, Lecture Notes in computer science, 2001, vol. 2139, pp. 41-62.
-
(2001)
Crypto 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
3
-
-
84985922619
-
Tracing traitors
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," in Crypto 1994- Lecture Notes in computer science, 1994, vol. 839, pp. 480-491.
-
(1994)
Crypto 1994- lecture Notes in Computer Science
, vol.839
, pp. 480-491
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
4
-
-
0034188648
-
Tracing traitors
-
B.Chor, M. Naor A. Fiat, and B Pinkas, "Tracing traitors," in IEEE Transactions on Information Theory, 2000, vol. 46, pp. 893-910.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 893-910
-
-
Chor, B.1
Naor, M.2
Fiat, A.3
Pinkas, B.4
-
5
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," in IEEE Transactions on Information Theory, 1998, vol. 44, No.5, pp. 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
R. Blakely A. Barg and G. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," in IEEE Transactions on Information Theory, 2003, vol. 49, pp. 852-865.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 852-865
-
-
Blakely, R.1
Barg, A.2
Kabatiansky, G.3
-
8
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
M. Wu, W.Trappe, Z.J.Wang, and K.J.R.Liu, "Collusion-resistant fingerprinting for multimedia," in IEEE Signal Processing Magazine, 2004, vol. 21, pp. 15-27.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, K.J.R.4
-
9
-
-
84957076207
-
Dynamic traitor tracing
-
A. Fiat and T. Tassa, "Dynamic traitor tracing," in Crypto 1999, Lecture Notes in computer science, 1999, vol. 1666, pp. 354-371.
-
(1999)
Crypto 1999, Lecture Notes in Computer Science
, vol.1666
, pp. 354-371
-
-
Fiat, A.1
Tassa, T.2
-
11
-
-
18344390014
-
Efficient traitor tracing
-
H.Jin, J.Lotspiech, and M.Blaum, "Efficient traitor tracing," in International Symposium on Communication Theory & Applications, 2003, pp. 200-204.
-
(2003)
International Symposium on Communication Theory & Applications
, pp. 200-204
-
-
Jin, H.1
Lotspiech, J.2
Blaum, M.3
-
12
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
D.R. Stinson J. N. Staddon and R. Wei, "Combinatorial properties of frameproof and traceability codes," in IEEE Transactions on Information Theory, 2001, vol. 47, pp. 1042-1049.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1042-1049
-
-
Stinson, D.R.1
Staddon, J.N.2
Wei, R.3
|