Dynamic Traitor Tracing
暂无分享,去创建一个
[1] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[2] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[3] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[4] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[5] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[6] Moni Naor,et al. Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.
[7] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[8] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[9] Jirí Sgall,et al. Efficient dynamic traitor tracing , 2000, SODA '00.
[10] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[11] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[12] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[13] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[14] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[15] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[16] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..