-
2
-
-
84947942283
-
Fingerprinting long forgiving messages
-
Springer-Verlag Berlin, Heidelberg, Germany
-
BLAKLEY, G. R., MEADOWS, C, AND PURDY, G. B. 1985. Fingerprinting long forgiving messages. In Proceedings of Crypto '85. Springer-Verlag Berlin, Heidelberg, Germany, 180-189.
-
(1985)
Proceedings of Crypto '85
, pp. 180-189
-
-
BLAKLEY, G.R.1
MEADOWS, C.2
PURDY, G.B.3
-
3
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Springer-Verlag, Berlin, Heidelberg, Germany
-
BONEH, D., AND FRANKLIN, M. 1999. An efficient public key traitor tracing scheme. In Proceedings of Crypto '99. Springer-Verlag, Berlin, Heidelberg, Germany, 338-353.
-
(1999)
Proceedings of Crypto '99
, pp. 338-353
-
-
BONEH, D.1
FRANKLIN, M.2
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
BONEH, D., AND SHAW, J. 1998. Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44,480-491.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 480-491
-
-
BONEH, D.1
SHAW, J.2
-
5
-
-
84985922619
-
Tracing traitors
-
Proceedings of Crypto '94, Springer-Verlag, Berlin, Heidelberg, Germany
-
CHOR, B., FIAT, A., AND NAOR, M. 1994. Tracing traitors. In Proceedings of Crypto '94. Lecture Notes in Computer Science, vol. 839. Springer-Verlag, Berlin, Heidelberg, Germany, 257-270.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
CHOR, B.1
FIAT, A.2
NAOR, M.3
-
7
-
-
0013138808
-
Dynamic traitor tracing
-
FIAT, A., AND TASSA, T. 2001. Dynamic traitor tracing. J. Crypt. 14,3,211-223.
-
(2001)
J. Crypt
, vol.14
, Issue.3
, pp. 211-223
-
-
FIAT, A.1
TASSA, T.2
-
8
-
-
84947944329
-
Error- and collusion-secure fingerprinting for digital data
-
Proceedings of the Symposium on Information Hiding '99. Springer-Verlag, Berlin
-
GUTH, J., AND PfiTZMANN, B. 2000. Error- and collusion-secure fingerprinting for digital data. In Proceedings of the Symposium on Information Hiding '99. Springer-Verlag, Berlin, 134-145. LNCS 1768.
-
(1768)
LNCS
, pp. 134-145
-
-
GUTH, J.1
PfiTZMANN, B.2
-
9
-
-
84890411878
-
-
Kilian, J., Leighton, T., Matheson, L., Shamoon, T., Tarian, R., and Zane, F 1998. Resistance of digital watermarks to collusive attacks. In Proceedings of the IEEE International Symposium on Information Theory. IEEE Computer Society Press, Los Alamitos, CA, 71.
-
Kilian, J., Leighton, T., Matheson, L., Shamoon, T., Tarian, R., and Zane, F 1998. Resistance of digital watermarks to collusive attacks. In Proceedings of the IEEE International Symposium on Information Theory. IEEE Computer Society Press, Los Alamitos, CA, 71.
-
-
-
-
10
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
Advances in Cryptology-EUROCRYPT' 98, Springer, Berlin, Germany
-
KUROSAWA, K., AND Desmedt, Y. 1998. Optimum traitor tracing and asymmetric schemes. In Advances in Cryptology-EUROCRYPT' 98. Lecture Notes in Computer Science, vol. 1403. Springer, Berlin, Germany, 145-157.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 145-157
-
-
KUROSAWA, K.1
Desmedt, Y.2
-
11
-
-
0038046046
-
-
Ph.D. dissertation. Linköping Studies in Science and Technology. Thesis No. 798
-
LINDKVIST, T. 1999. Fingerprinting digital documents. Ph.D. dissertation. Linköping Studies in Science and Technology. Thesis No. 798.
-
(1999)
Fingerprinting digital documents
-
-
LINDKVIST, T.1
-
12
-
-
0038077509
-
Lower bounds for collusion-secure fingerprinting
-
ACM, New York
-
PEIKERT, C, SHELAT, A., AND SMITH, A. 2003. Lower bounds for collusion-secure fingerprinting. In Proceedings of the 14th Annual ACM-S1AM Symposium on Discrete Algorithms (SODA). ACM, New York, 472-179.
-
(2003)
Proceedings of the 14th Annual ACM-S1AM Symposium on Discrete Algorithms (SODA)
, pp. 472-179
-
-
PEIKERT, C.1
SHELAT, A.2
SMITH, A.3
-
13
-
-
0003321399
-
Probability theory
-
North-Holland Publishing Co, Amsterdam, London; American Elsevier Publishing Co, Inc, New York
-
RÉNYI, A. 1970. Probability theory. North-Holland Series in Applied Mathematics and Mechanics, vol. 10. North-Holland Publishing Co., Amsterdam, London; American Elsevier Publishing Co., Inc., New York.
-
(1970)
North-Holland Series in Applied Mathematics and Mechanics
, vol.10
-
-
RÉNYI, A.1
-
14
-
-
84974601983
-
Sequential traitor tracing
-
Proceedings of Crypto '2000, Springer-Verlag Berlin, Heidelberg, Germany
-
SAFAVI-NAINI, R., AND Wang, Y. 2000. Sequential traitor tracing. In Proceedings of Crypto '2000. Lecture Notes in Computer Science, vol. 1880. Springer-Verlag Berlin, Heidelberg, Germany, 316-332.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 316-332
-
-
SAFAVI-NAINI, R.1
Wang, Y.2
-
15
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
STADDON, J. N, STINSON, D. R., AND WEI, R. 2001. Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47, 1042-1049.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, pp. 1042-1049
-
-
STADDON, J.N.1
STINSON, D.R.2
WEI, R.3
-
17
-
-
17444400933
-
-
TASSA, T. 2005. Low bandwidth dynamic traitor tracing schemes. J. Crypt. 18, 167-183.
-
TASSA, T. 2005. Low bandwidth dynamic traitor tracing schemes. J. Crypt. 18, 167-183.
-
-
-
-
19
-
-
84937541590
-
Improved Boneh-Shaw content fingerprinting
-
Topics in Cryptology-CT-RSA 2001, Springer-Verlag Berlin, Germany
-
YACOBI, Y 2001. Improved Boneh-Shaw content fingerprinting. In Topics in Cryptology-CT-RSA 2001. Lecture Notes in Computer Science, vol. 2020. Springer-Verlag Berlin, Germany, 378-391.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 378-391
-
-
YACOBI, Y.1
|