Robust parent-identifying codes
暂无分享,去创建一个
Alexander Barg | Gregory A. Kabatiansky | Cédric Tavernier | G. Robert Blakley | A. Barg | C. Tavernier | G. Robert Blakley | G. Kabatiansky
[1] Yuan Zhou. Introduction to Coding Theory , 2010 .
[2] Alexander Barg,et al. On the Fingerprinting Capacity Under the Marking Assumption , 2006, IEEE Transactions on Information Theory.
[3] Miguel Soriano,et al. Identification of traitors in algebraic-geometric traceability codes , 2004, IEEE Transactions on Signal Processing.
[4] Thomas Sirvent. Traitor tracing scheme with constant ciphertext rate against powerful pirates , 2006, IACR Cryptol. ePrint Arch..
[5] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[6] Gábor Tardos,et al. High rate fingerprinting codes and the fingerprinting capacity , 2009, SODA.
[7] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[8] R. L. Fountain,et al. The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[9] Jacobus H. van Lint,et al. Introduction to Coding Theory , 1982 .
[10] L. A. Bassalygo,et al. Hash codes , 1997, Proceedings of IEEE International Symposium on Information Theory.
[11] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[12] Gérard D. Cohen,et al. A hypergraph approach to the identifying parent property: the case of multiple parents , 2001, Electron. Notes Discret. Math..
[13] Gérard D. Cohen,et al. Generalized hashing and parent-identifying codes , 2003, J. Comb. Theory, Ser. A.
[14] Jean-Paul M. G. Linnartz,et al. On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.
[15] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[16] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[17] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[18] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[19] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[20] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[21] Olivier Billet,et al. Efficient Traitor Tracing from Collusion Secure Codes , 2008, ICITS.