Search

Your search keyword '"Traitor tracing"' showing total 544 results

Search Constraints

Start Over You searched for: Descriptor "Traitor tracing" Remove constraint Descriptor: "Traitor tracing"
544 results on '"Traitor tracing"'

Search Results

53. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.

54. Hardness of k-LWE and Applications in Traitor Tracing.

55. Blind 3D-Printing Watermarking Using Moment Alignment and Surface Norm Distribution

56. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

57. Improved upper bounds for parent-identifying set systems and separable codes

58. Efficient ciphertext-policy attribute-based encryption with blackbox traceability

59. Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

60. 基于广播加密的多策略非对称叛逆者追踪方案.

61. Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining.

62. 素数阶群上可追踪并撤销叛徒的ABE方案.

63. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.

64. Almost separating and almost secure frameproof codes over $$q$$ -ary alphabets.

65. ANSWERING n2+o(1) COUNTING QUERIES WITH DIFFERENTIAL PRIVACY IS HARD.

66. Novel two-level tracing scheme using clustering algorithm.

67. Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment

68. Scene-based fingerprinting method for traitor tracing.

69. Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders.

70. A collusion attack on asymmetric group key exchange.

71. A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes.

72. Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia.

73. False positive probabilities in q-ary Tardos codes: comparison of attacks.

74. Tally-Based Simple Decoders for Traitor Tracing and Group Testing.

75. Study on Watermarking Relational Databases

76. Fast Fallback Watermark Detection Using Perceptual Hashes

77. Analysis of Set-cover traitor tracing scheme.

78. Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching.

79. White Box Traitor Tracing

80. Construction of multi-user cryptosystems

81. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video

82. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

83. Connecting Theory and Practice in Modern Cryptography

84. Binary and $$q$$ -ary Tardos codes, revisited.

85. False Negative probabilities in Tardos codes.

86. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

87. A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing

88. FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability

89. Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.

90. Reversible joint fingerprinting and decryption based on side match vector quantization.

91. Design of white-box encryption schemes for mobile applications security

92. Conception de schémas de chiffrement boîte blanche pour la sécurité des applications mobiles

93. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud

94. An Improved Encryption Scheme for Traitor Tracing from Lattice

95. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

96. Black-Box Trace&Revoke Codes.

97. Dynamic Tardos Traitor Tracing Schemes.

98. Security analysis of two traitor tracing schemes.

99. Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.

100. Further analysis of pairing-based traitor tracing schemes for broadcast encryption.

Catalog

Books, media, physical & digital resources