Search

Your search keyword '"Traitor tracing"' showing total 492 results

Search Constraints

Start Over You searched for: Descriptor "Traitor tracing" Remove constraint Descriptor: "Traitor tracing"
492 results on '"Traitor tracing"'

Search Results

451. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

452. Information hiding for EC: public key traitor tracing for digital copyright protection

453. An efficient traitor tracing scheme for broadcast encryption

454. The LSD Broadcast Encryption Scheme

455. Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing

456. On Crafty Pirates and Foxy Tracers

457. Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing

458. A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing

459. Traitor Tracing with Constant Transmission Rate

460. Linear Code Implies Public-Key Traitor Tracing

461. Multimedia Fingerprinting for Multiuser Forensics and Security

462. Efficient Traitor Tracing Algorithms Using List Decoding

463. Efficient Asymmetric Public-Key Traitor Tracing Without Trusted Agents

464. Revocation and Tracing Schemes for Stateless Receivers

465. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

466. Efficient Asymmetric Self-Enforcement Scheme with Public Traceability

467. Sequential Traitor Tracing

468. A Combinatorial Approach to Asymmetric Traitor Tracing

469. Dynamic Traitor Tracing

470. Key Preassigned Traceability Schemes for Broadcast Encryption

471. An Efficient Public Key Traitor Tracing Scheme

472. Threshold traitor tracing

473. Optimum traitor tracing and asymmetric schemes

474. On a traitor tracing scheme from ACISP 2003

475. Chameleon — A new kind of stream cipher

476. Trials of traced traitors

477. Defending against the pirate evolution attack

478. Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer

479. Concatenated construction of traceability codes for multimedia fingerprinting

480. Practical fingerprinting system for images

481. Connecting Theory and Practice in Modern Cryptography

483. Traceability codes

484. An Improved Traitors Tracing Scheme Based on ELGamal

485. Broadcast Encryption and Traitor Tracing for Conditional Access Systems

486. Almost separating and almost secure frameproof codes over q-ary alphabets

487. On the Security of Pseudorandomized Information-Theoretically Secure Schemes

488. Enhanced Blind Decoding of Tardos Codes with New Map-Based Functions

489. Practical scenarios for the van Trung-Martirosyan codes

490. High Efficient Joint Fingerprinting and Decryption for Multimedia Distribution

491. Randomised dynamic traitor tracing

492. Efficient dynamic traitor tracing

Catalog

Books, media, physical & digital resources