메뉴 건너뛰기




Volumn 1462, Issue , 1998, Pages 502-517

Threshold traitor tracing

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; PROBABILITY;

EID: 84957617696     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055750     Document Type: Conference Paper
Times cited : (96)

References (19)
  • 1
    • 0026834814 scopus 로고
    • Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs
    • N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, vol. 38 (1992), 509-516.
    • (1992) IEEE Transactions on Information Theory , vol.38 , pp. 509-516
    • Alon, N.1    Bruck, J.2    Naor, J.3    Naor, M.4    Roth, R.5
  • 4
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Springr-Verlag LNCS
    • E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Proc. Advances in Cryptology-Crypto '97, Springr-Verlag LNCS 1294 (1997), 513-525.
    • (1997) Proc. Advances in Cryptology-Crypto '97 , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 6
    • 0001039461 scopus 로고
    • Collusion-Secure Fingerprinting for Digital date
    • D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital date, Proc. Advances in Cryptology-Crypto '95 (1995), 452-465.
    • (1995) Proc. Advances in Cryptology-Crypto , vol.95 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 10
    • 84947937393 scopus 로고    scopus 로고
    • A Secure, Robust Watermark for Multimedia
    • Cambridge, UK, Springer-Verlag LNCS 1174
    • Cox I., Kilian J., Leighton T. and Shamoon T., A Secure, Robust Watermark for Multimedia, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 185-206.
    • (1996) Information Hiding Workshop , pp. 185-206
    • Cox, I.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 12
    • 51249175955 scopus 로고
    • Families of finite sets in which no set is covered by the union of r others
    • P. Erdös, P. Frankl and Z. Füredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51 (1985), 79-89.
    • (1985) Israel J. of math , vol.51 , pp. 79-89
    • Erdös, P.1    Frankl, P.2    Füredi, Z.3
  • 14
    • 0021467937 scopus 로고
    • Storing a Sparse Table with 0(1) Worst Case Access Time
    • M.L. Fredman, J. Komlós and E. Szemerédi, Storing a Sparse Table with 0(1) Worst Case Access Time, Journal of the ACM, Vol 31 (1984), 538-544.
    • (1984) Journal of the ACM , vol.31 , pp. 538-544
    • Fredman, M.L.1    Komlós, J.2    Szemerédi, E.3
  • 17
    • 84954420982 scopus 로고    scopus 로고
    • Trials of Traced Traitors
    • Cambridge, UK, Springer-Verlag LNCS 1174
    • B. Pfttzmann, Trials of Traced Traitors, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 49-64.
    • (1996) Information Hiding Workshop , pp. 49-64
    • Pfttzmann, B.1
  • 19
    • 0019572642 scopus 로고
    • New Hash Functions and Their Use in Authentication and Set Equality
    • M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22 (1981), 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.