-
1
-
-
33746879798
-
An elementary proof of the strong converse theorem for the multiple-access channel
-
R. Ahlswede, "An elementary proof of the strong converse theorem for the multiple-access channel," J. Combin., Inf. and Syst. Sci., vol. 7, no. 3, pp. 216-230, 1982.
-
(1982)
J. Combin., Inf. and Syst. Sci
, vol.7
, Issue.3
, pp. 216-230
-
-
Ahlswede, R.1
-
2
-
-
45249120559
-
Codes with the identifiable parent property and the multiple-access channel
-
General Theory of Information Transfer , R. Ahlswede et al, Ed. Berlin, Germany: Springer-Verlag
-
R. Ahlswede and N. Cai, "Codes with the identifiable parent property and the multiple-access channel," in General Theory of Information Transfer (Lecture Notes in Computer Science), R. Ahlswede et al., Ed. Berlin, Germany: Springer-Verlag, 2006, vol. 4123, pp. 249-257.
-
(2006)
Lecture Notes in Computer Science
, vol.4123
, pp. 249-257
-
-
Ahlswede, R.1
Cai, N.2
-
3
-
-
9744257021
-
New bounds on parent-identifying codes: The case of multiple parents
-
N. Alon and U. Stav, "New bounds on parent-identifying codes: The case of multiple parents," Combin. Probab. Comput., vol. 13, no. 6, pp. 795-807, 2004.
-
(2004)
Combin. Probab. Comput
, vol.13
, Issue.6
, pp. 795-807
-
-
Alon, N.1
Stav, U.2
-
4
-
-
39049098198
-
Random binary fingerprinting codes for arbitrarily sized coalitions
-
Seattle, WA, Jul
-
N. P. Anthapadmanabhan and A. Barg, "Random binary fingerprinting codes for arbitrarily sized coalitions," in Proc. IEEE Int. Symp. Information Theory (ISIT 2006), Seattle, WA, Jul. 2006, pp. 351-355.
-
(2006)
Proc. IEEE Int. Symp. Information Theory (ISIT 2006)
, pp. 351-355
-
-
Anthapadmanabhan, N.P.1
Barg, A.2
-
6
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
Apr
-
A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
7
-
-
0001070499
-
A hypergraph approach to the identifying parent property: The case of multiple parents
-
A. Barg, G. Cohen, S. Encheva, G. Kabatiansky, and G. Zémor, "A hypergraph approach to the identifying parent property: The case of multiple parents," SIAM J. Discr. Math., vol. 14, no. 3, pp. 423-431, 2001.
-
(2001)
SIAM J. Discr. Math
, vol.14
, Issue.3
, pp. 423-431
-
-
Barg, A.1
Cohen, G.2
Encheva, S.3
Kabatiansky, G.4
Zémor, G.5
-
8
-
-
0037692013
-
An upper bound on the size of a code with the κ-identifiable property
-
S. R. Blackburn, "An upper bound on the size of a code with the κ-identifiable property," J. Combinat. Theory Ser. A, vol. 102, pp. 179-185, 2003.
-
(2003)
J. Combinat. Theory Ser. A
, vol.102
, pp. 179-185
-
-
Blackburn, S.R.1
-
9
-
-
5044245035
-
Random coding technique for digital fingerprinting codes: Fighting two pirates revisited
-
Chicago, IL, Jun./Jul
-
G. R. Blakley and G. Kabatiansky, "Random coding technique for digital fingerprinting codes: Fighting two pirates revisited," in Proc. IEEE Int. Symp. Information Theory (ISIT 2004), Chicago, IL, Jun./Jul. 2004, pp. 203-203.
-
(2004)
Proc. IEEE Int. Symp. Information Theory (ISIT 2004)
, pp. 203-203
-
-
Blakley, G.R.1
Kabatiansky, G.2
-
10
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
12
-
-
0000678814
-
On codes with the identifiable parent property
-
H. D. L. Hollmann, J. H. van Lint, J.-P. Linnartz, and L. M. G. M. Tolhuizen, "On codes with the identifiable parent property," J. Combin. Theory Ser. A, vol. 82, pp. 121-133, 1998.
-
(1998)
J. Combin. Theory Ser. A
, vol.82
, pp. 121-133
-
-
Hollmann, H.D.L.1
van Lint, J.H.2
Linnartz, J.-P.3
Tolhuizen, L.M.G.M.4
-
14
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Mar
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
15
-
-
15044340426
-
On the capacity game of private fingerprinting systems under collusion attacks
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.3
, pp. 884-899
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
16
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
Mar
-
J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 1042-1049, Mar. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.2
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
17
-
-
0038447029
-
J. ACM, Preliminary version in Proc. 35th Annu. Symp. Theory of Computing (STOC 2003)
-
to be published
-
G. Tardos, "Optimal probabilistic fingerprint codes," J. ACM, Preliminary version in Proc. 35th Annu. Symp. Theory of Computing (STOC 2003), pp. 116-125, 2003, to be published.
-
(2003)
, pp. 116-125
-
-
Tardos, G.1
|