Optimal probabilistic fingerprint codes
暂无分享,去创建一个
[1] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[2] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[3] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[4] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[5] Abhi Shelat,et al. Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.
[6] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[7] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[8] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[9] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[10] Robert E. Tarjan,et al. Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[11] Tamir Tassa,et al. Low Bandwidth Dynamic Traitor Tracing Schemes , 2005, Journal of Cryptology.
[12] Frank Thomson Leighton,et al. Guessing secrets , 2001, SODA '01.
[13] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[14] Tina Lindkvist,et al. Fingerprinting of digital documents , 1999 .