Search

Your search keyword '"Traitor tracing"' showing total 195 results

Search Constraints

Start Over You searched for: Descriptor "Traitor tracing" Remove constraint Descriptor: "Traitor tracing" Topic computer.software_genre Remove constraint Topic: computer.software_genre
195 results on '"Traitor tracing"'

Search Results

1. TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

2. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

3. Efficient ciphertext-policy attribute-based encryption with blackbox traceability

4. Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

5. Study on Watermarking Relational Databases

6. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video

7. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

8. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

9. A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing

10. FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability

11. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud

12. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

13. Anonymous and Unlinkable Membership Authentication with Illegal Privilege Transfer Detection

14. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

15. New dissimilarity measures for image phylogeny reconstruction

16. How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services

17. A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving

18. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

19. Fingerprinting of Relational Databases for Stopping the Data Theft

20. Traitor-Tracing from LWE Made Simple and Attribute-Based

21. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe

22. A note on the security of KHL scheme

23. Secure cloud storage using anonymous and blackbox traceable data access control

24. A multi-watermarking protocol for health information management

25. SECURE SYSTEM BASED ON RECOMBINED FINGERPRINTS FOR SHARING MULTIMEDIA FILES IN PEER TO PEER NETWORKS

26. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

27. Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

28. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

29. Prevention of Illegal Content Sharing in Peer to Peer Systems

30. A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack

31. An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms

32. A two-stage traitor tracing scheme for hierarchical fingerprints

33. Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups

34. A collusion attack on asymmetric group key exchange

35. Fully Secure Codes Based Tracing and Revoking Scheme with Constant Ciphertext

36. Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack

37. An Efficient Multimedia DRM Technique using Secure Arithmetic Coding

38. A practical application of CP-ABE for mobile PHR system: a study on the user accountability

39. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

40. Fingerprinting for Broadcast Content Distribution System

41. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key

42. Access control scheme with tracing for outsourced databases

43. Further analysis of pairing-based traitor tracing schemes for broadcast encryption

44. A Public Key Traitor Tracing Scheme with Key-update Method

45. Tracing and revoking scheme for dynamic privileges against pirate rebroadcast

46. Traceable content protection based on chaos and neural networks

47. Efficient trace and revoke schemes

48. Traitor Tracing Schemes: a Review

49. A Multi-Key Pirate Decoder Against Traitor Tracing Schemes

50. Traitor tracing over YouTube video service—proof of concept

Catalog

Books, media, physical & digital resources