Search

Your search keyword '"Traitor tracing"' showing total 539 results

Search Constraints

Start Over You searched for: Descriptor "Traitor tracing" Remove constraint Descriptor: "Traitor tracing"
539 results on '"Traitor tracing"'

Search Results

1. RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain.

2. Toward Practical Deep Blind Watermarking for Traitor Tracing

3. White-Box Traitor-Tracing from Tardos Probabilistic Codes

4. Post-quantum identity-based traitor tracing.

5. Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.

6. Traitor Tracing After Visible Watermark Removal

7. Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security

8. A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.

9. COLLUSION RESISTANT TRAITOR TRACING FROM LEARNING WITH ERRORS.

10. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key

11. Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe

12. Traitor Tracing Based on Partially-Ordered Hierarchical Encryption

13. A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs

14. Hardness of k-LWE and Applications in Traitor Tracing

15. White-Box Security Notions for Symmetric Encryption Schemes

16. Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited

17. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes

18. MLPPT-MHS: Multi-Layered Privacy Preserving and Traceable Mobile Health System.

19. File Syncing-and-Sharing using Efficient Traitor Tracing and Revocation.

20. A Novel Approach for Smart Healthcare in Secure Cloud of Things.

21. TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

22. Adaptively secure attribute-based encryption for traitor tracing

23. Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing

24. Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces

25. Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model

26. A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet

28. Codes Based Tracing and Revoking Scheme with Constant Ciphertext

29. Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext

31. Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders

32. Identity-Based Trace and Revoke Schemes

33. Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithm

34. Fighting Pirates 2.0

35. Traitor Tracing against Public Collaboration

36. Constructions of almost secure frameproof codes with applications to fingerprinting schemes.

37. A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate

38. Estimating the Minimal Length of Tardos Code

39. Defending against the Pirate Evolution Attack

40. Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys

41. Traitor Tracing with Optimal Transmission Rate

42. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack

43. A Colorization Based Animation Broadcast System with Traitor Tracing Capability

44. Perturbing and Protecting a Traceable Block Cipher

45. Traitor Tracing Against Powerful Attacks Using Combinatorial Designs

46. Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity

48. A Traceable Block Cipher

50. Blind 3D-Printing Watermarking Using Moment Alignment and Surface Norm Distribution

Catalog

Books, media, physical & digital resources