Fingerprinting Codes and Related Combinatorial Structures
暂无分享,去创建一个
[1] W. Marsden. I and J , 2012 .
[2] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[3] Douglas R. Stinson,et al. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures , 2000 .
[4] Hiroshi Kimura,et al. Classification of Hadamard matrices of order 28 , 1994, Discret. Math..
[5] Dean Crnkovic,et al. Some new symmetric designs with parameters (64, 28, 12) , 2001, Discret. Math..
[6] Douglas R. Stinson,et al. On tight bounds for binary frameproof codes , 2015, Des. Codes Cryptogr..
[7] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[8] C. Colbourn,et al. Handbook of Combinatorial Designs , 2006 .
[9] Tran van Trung. Maximal arcs and related designs , 1991, J. Comb. Theory, Ser. A.
[10] D. A. Burgess. On Character Sums and Primitive Roots , 1962 .
[11] Tran van Trung,et al. Improved bounds for separating hash families , 2013, Des. Codes Cryptogr..
[12] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[13] Douglas R. Stinson,et al. Frameproof and IPP Codes , 2001, INDOCRYPT.
[14] Kurt Mehlhorn,et al. On the program size of perfect and universal hash functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[15] Tran van Trung. A tight bound for frameproof codes viewed in terms of separating hash families , 2014, Des. Codes Cryptogr..
[16] Charles J. Colbourn,et al. Binary Covering Arrays and Existentially Closed Graphs , 2009, IWCC.
[17] Tran van Trung,et al. Bounds for separating hash families , 2011, J. Comb. Theory, Ser. A.
[18] Gennian Ge,et al. New Bounds for Frameproof Codes , 2017, IEEE Transactions on Information Theory.
[19] Jacobus H. van Lint,et al. Ovals in Projective Designs , 1979, J. Comb. Theory, Ser. A.
[20] Douglas R. Stinson,et al. A bound on the size of separating hash families , 2008, J. Comb. Theory, Ser. A.
[21] Abhi Shelat,et al. Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.
[22] Douglas R. Stinson,et al. On generalized separating hash families , 2008, J. Comb. Theory, Ser. A.
[23] Minquan Cheng,et al. On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting , 2011, IEEE Transactions on Information Theory.
[24] R.H.F. Denniston. Enumeration of Symmetric Designs (25,9,3) , 1982 .
[25] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[26] R. Graham,et al. A Constructive Solution to a Tournament Problem , 1971, Canadian Mathematical Bulletin.
[27] Douglas R. Stinson,et al. Combinatorial designs: constructions and analysis , 2003, SIGA.
[28] Behruz Tayfeh-Rezaie,et al. On the classification of Hadamard matrices of order 32 , 2010 .
[29] Douglas R Stinson,et al. New constructions for perfect hash families and related structures using combinatorial designs and codes , 2000 .
[30] Simon R. Blackburn. Frameproof Codes , 2003, SIAM J. Discret. Math..