Two-level fingerprinting codes
暂无分享,去创建一个
[1] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[2] Gábor Tardos,et al. High rate fingerprinting codes and the fingerprinting capacity , 2009, SODA.
[3] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[4] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[5] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[6] Shih-Chun Lin,et al. Fingerprinting With Minimum Distance Decoding , 2007, IEEE Transactions on Information Forensics and Security.
[7] Pierre Moulin,et al. Saddle-point solution of the fingerprinting capacity game under the marking assumption , 2009, 2009 IEEE International Symposium on Information Theory.
[8] Simon R. Blackburn. Surveys in Combinatorics 2003: Combinatorial schemes for protecting digital content , 2003 .
[9] Alexander Barg,et al. On the Fingerprinting Capacity Under the Marking Assumption , 2006, IEEE Transactions on Information Theory.