Traitor Tracing for Shortened and Corrupted Fingerprints
暂无分享,去创建一个
[1] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[2] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[3] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[4] Venkatesan Guruswami,et al. List decoding of error correcting codes , 2001 .
[5] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[6] Jessica Staddon,et al. Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.
[7] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[8] G. David Forney,et al. Generalized minimum distance decoding , 1966, IEEE Trans. Inf. Theory.
[9] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[10] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[11] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[12] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[13] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[14] Douglas R. Stinson,et al. Frameproof and IPP Codes , 2001, INDOCRYPT.
[15] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[16] Alexander Vardy,et al. Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.
[17] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[18] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[19] Reihaneh Safavi-Naini,et al. New results on frame-proof codes and traceability schemes , 2001, IEEE Trans. Inf. Theory.
[20] Jacobus H. van Lint,et al. Introduction to Coding Theory , 1982 .
[21] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[22] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[23] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[24] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[25] Amos Fiat,et al. Dynamic Traitor Training , 1999, CRYPTO.
[26] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[27] Jean-Paul M. G. Linnartz,et al. On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.