Sequential traitor tracing
暂无分享,去创建一个
[1] Amos Fiat,et al. Dynamic Traitor Training , 1999, CRYPTO.
[2] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[3] S. G. Vladut,et al. Algebraic-Geometric Codes , 1991 .
[4] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[5] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[6] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[7] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[8] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[9] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[10] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[11] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[12] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[13] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[14] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[15] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[16] Jirí Sgall,et al. Efficient dynamic traitor tracing , 2000, SODA '00.