-
1
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
Advances in Cryptology - CRYPTO'95, Springer-Verlag, Berlin, Heidelberg, New York
-
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology - CRYPTO'95, Lecture Notes in Computer Science, volume 963, pages 453-465. Springer-Verlag, Berlin, Heidelberg, New York, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 453-465
-
-
Boneh, D.1
Shaw, J.2
-
2
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, Vol. 44, No. 5:1897-1905, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
84985922619
-
Tracing traitors
-
Advances in Cryptology - CRYPTO'94, Springer-Verlag, Berlin, Heidelberg, New York
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in Cryptology - CRYPTO'94, Lecture Notes in Computer Science, volume 839, pages 257-270. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
4
-
-
0004026002
-
-
Mulimedia Information and Systems. Morgan Kaufman Publishers
-
I. Cox, M. Miller, and J. Bloom. Digital Watermarking. Mulimedia Information and Systems. Morgan Kaufman Publishers, 2002.
-
(2002)
Digital Watermarking
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
-
5
-
-
0033601694
-
Combining digital watermarks and collusion secure fingerprinting for digital images
-
J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg. Combining digital watermarks and collusion secure fingerprinting for digital images. In Proceedings of SPIE, volume 3657, pages 171-182, 1999.
-
(1999)
Proceedings of SPIE
, vol.3657
, pp. 171-182
-
-
Dittmann, J.1
Behr, A.2
Stabenau, M.3
Schmitt, P.4
Schwenk, J.5
Ueberberg, J.6
-
6
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Advances in Cryptology - EUROCRYPT'99, Springer-Verlag, Berlin, Heidelberg, New York
-
F. Ergun, J. Kilian, and R. Kumar. A note on the limits of collusion-resistant watermarks. In Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, volume 1592, pages 140-149. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
7
-
-
84957076207
-
Dynamic traitor tracing
-
Advances in Cryptology CRYPTO'99, Springer-Verlag, Berlin, Heidelberg, New York
-
A. Fiat and T. Tassa. Dynamic traitor tracing. In Advances in Cryptology CRYPTO'99, Lecture Notes in Computer Science, volume 1666, pages 354-371. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 354-371
-
-
Fiat, A.1
Tassa, T.2
-
8
-
-
33746350704
-
Generalized minimum distance decoding
-
Jr. G. D. Forney. Generalized minimum distance decoding. IEEE Transactions on Information Theory, Vol. IT-12, No. 2:125-131, 1966.
-
(1966)
IEEE Transactions on Information Theory
, vol.IT-12
, Issue.2
, pp. 125-131
-
-
Forney Jr., G.D.1
-
9
-
-
84957067564
-
Efficient methods for integrating traceability and broadcast encryption
-
Advances in Cryptology - CRYPTO'99, Springer-Verlag, Berlin, Heidelberg, New York
-
E. Gafni, J. Staddon, and Y. L. Yin. Efficient methods for integrating traceability and broadcast encryption. In Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, volume 1666, pages 372-387. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
10
-
-
0003460538
-
-
Ph.D Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA
-
V. Guruswami. List decoding of error-correcting codes. Ph.D Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA, 2001.
-
(2001)
List Decoding of Error-correcting Codes
-
-
Guruswami, V.1
-
11
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraicgeometry codes
-
V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraicgeometry codes. IEEE Transactions on Information Theory, Vol. 45, No. 6:1757-1767, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
12
-
-
84947944329
-
Error- and collusion-secure fingerprinting for digital data
-
Information Hiding'99, Springer-Verlag, Berlin, Heidelberg, New York
-
H. Guth and B. Pfitzmann. Error- and collusion-secure fingerprinting for digital data. In Information Hiding'99, Lecture Notes in Computer Science, volume 1768, pages 134-145. Springer-Verlag, Berlin, Heidelberg, New York, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1768
, pp. 134-145
-
-
Guth, H.1
Pfitzmann, B.2
-
13
-
-
0000678814
-
On codes with the identifiable parent property
-
H. D. L. Hollmann, J. H. van Lint, J. P. Linnartz, and L. M. G. M. Tolhuizen. On codes with the identifiable parent property. Journal of Combinatorial Theory, Series A, 82:121-133, 1998.
-
(1998)
Journal of Combinatorial Theory, Series A
, vol.82
, pp. 121-133
-
-
Hollmann, H.D.L.1
Van Lint, J.H.2
Linnartz, J.P.3
Tolhuizen, L.M.G.M.4
-
14
-
-
84880901368
-
Self protecting pirates and black-box traitor tracing
-
Advances in Cryptology - CRYPTO'01, Springer-Verlag, Berlin, Heidelberg, New York
-
A. Kiayias and M. Yung. Self protecting pirates and black-box traitor tracing. In Advances in Cryptology - CRYPTO'01, Lecture Notes in Computer Science, volume 2139, pages 63-79. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
15
-
-
84959054452
-
On crafty pirate and foxy tracers
-
Security and Privacy in Digital Rights Management (SPDRM 2001), Springer-Verlag, Berlin, Heidelberg, New York
-
A. Kiayias and M. Yung. On crafty pirate and foxy tracers. In Security and Privacy in Digital Rights Management (SPDRM 2001), Lecture Notes in Computer Science, volume 2320, pages 22-39. Springer-Verlag, Berlin, Heidelberg, New York, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2320
, pp. 22-39
-
-
Kiayias, A.1
Yung, M.2
-
18
-
-
0003262491
-
Optimum traitor tracing and asymmetric schemes
-
Advances in Cryptology - EUROCRYPT'98, Springer-Verlag, Berlin, Heidelberg, New York
-
K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In Advances in Cryptology - EUROCRYPT'98, Lecture Notes in Computer Science, volume 1462, pages 502-517. Springer-Verlag, Berlin, Heidelberg, New York, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 502-517
-
-
Kurosawa, K.1
Desmedt, Y.2
-
19
-
-
84954420982
-
Trials of traced traitors
-
Information Hiding, Springer-Verlag, Berlin, Heidelberg, New York
-
B. Pfitzmann. Trials of traced traitors. In Information Hiding, Lecture Notes in Computer Science, volume 1174, pages 49-64. Springer-Verlag, Berlin, Heidelberg, New York, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
20
-
-
84974601983
-
Sequential traitor tracing
-
Advances in Cryptology - CRYPTO 2000, Springer-Verlag, Berlin, Heidelberg, New York
-
R. Safavi-Naini and Y. Wang. Sequential traitor tracing. In Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, volume 1880, pages 316-332. Springer-Verlag, Berlin, Heidelberg, New York, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
21
-
-
0035504864
-
New results on frameproof codes and traceability schemes
-
R. Safavi-Naini and Y. Wang. New results on frameproof codes and traceability schemes. IEEE Transactions on Information Theory, Vol. 47, No. 7:3029-3033, 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 3029-3033
-
-
Safavi-Naini, R.1
Wang, Y.2
-
22
-
-
84959043688
-
Collusion secure q-ary fingerprinting for perceptual content
-
Security and Privacy in Digital Rights Management (SPDRM 2001), Springer-Verlag, Berlin, Heidelberg, New York
-
R. Safavi-Naini and Y. Wang. Collusion secure q-ary fingerprinting for perceptual content. In Security and Privacy in Digital Rights Management (SPDRM 2001), Lecture Notes in Computer Science, volume 2320, pages 57-75. Springer-Verlag, Berlin, Heidelberg, New York, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2320
, pp. 57-75
-
-
Safavi-Naini, R.1
Wang, Y.2
-
23
-
-
84974733414
-
Frameproof and IPP codes
-
Progress in Cryptology - INDOCRYPT 2001, Springer-Verlag, Berlin, Heidelberg, New York
-
P. Sarkar and D. R. Stinson. Frameproof and IPP codes. In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science, volume 2247, pages 117-126. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2247
, pp. 117-126
-
-
Sarkar, P.1
Stinson, D.R.2
-
24
-
-
77955708529
-
Efficient traitor tracing algorithms using list decoding
-
Advances in Cryptology - ASIACRYPT'01, Springer-Verlag, Berlin, Heidelberg, New York
-
A. Silverberg, J. Staddon, and J. Walker. Efficient traitor tracing algorithms using list decoding. In Advances in Cryptology - ASIACRYPT'01, Lecture Notes in Computer Science, volume 2248, pages 175-192. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 175-192
-
-
Silverberg, A.1
Staddon, J.2
Walker, J.3
-
25
-
-
0035270516
-
Combinatorial properties of flameproof and traceability codes
-
J. N. Staddon, D. R. Stinson, and R. Wei. Combinatorial properties of flameproof and traceability codes. IEEE transactions on information theory, Vol. 47, No. 3:1042-1049, 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
26
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM Journal on Discrete Mathematics, 11:41-53, 1998.
-
(1998)
SIAM Journal on Discrete Mathematics
, vol.11
, pp. 41-53
-
-
Stinson, D.1
Wei, R.2
-
27
-
-
84890047469
-
Key preassigned traceability schemes for broadcast encryption
-
Proceedings of SAC'98, Springer-Verlag, Berlin, Heidelberg, New York
-
D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. In Proceedings of SAC'98, Lecture Notes in Computer Science, volume 1556, pages 144-156. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1556
, pp. 144-156
-
-
Stinson, D.R.1
Wei, R.2
-
28
-
-
0031097176
-
Decoding of Reed Solomon codes beyond the error-correction bound
-
M. Sudan. Decoding of Reed Solomon codes beyond the error-correction bound. Journal of Complexity, 13:180-193, 1997.
-
(1997)
Journal of Complexity
, vol.13
, pp. 180-193
-
-
Sudan, M.1
-
29
-
-
0004089464
-
Introduction to Coding Theory
-
Springer-Verlag, New York
-
J. H. van Lint. Introduction to Coding Theory. Graduate texts in mathematics. Springer-Verlag, New York, 1999.
-
(1999)
Graduate Texts in Mathematics
-
-
Van Lint, J.H.1
|