539 results on '"Traitor tracing"'
Search Results
2. Toward Practical Deep Blind Watermarking for Traitor Tracing
3. White-Box Traitor-Tracing from Tardos Probabilistic Codes
4. Post-quantum identity-based traitor tracing.
5. Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
6. Traitor Tracing After Visible Watermark Removal
7. Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security
8. A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.
9. COLLUSION RESISTANT TRAITOR TRACING FROM LEARNING WITH ERRORS.
10. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
11. Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
12. Traitor Tracing Based on Partially-Ordered Hierarchical Encryption
13. A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs
14. Hardness of k-LWE and Applications in Traitor Tracing
15. White-Box Security Notions for Symmetric Encryption Schemes
16. Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
17. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
18. MLPPT-MHS: Multi-Layered Privacy Preserving and Traceable Mobile Health System.
19. File Syncing-and-Sharing using Efficient Traitor Tracing and Revocation.
20. A Novel Approach for Smart Healthcare in Secure Cloud of Things.
21. TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT
22. Adaptively secure attribute-based encryption for traitor tracing
23. Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing
24. Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces
25. Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model
26. A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet
27. Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme
28. Codes Based Tracing and Revoking Scheme with Constant Ciphertext
29. Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext
30. Traitor Tracing
31. Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
32. Identity-Based Trace and Revoke Schemes
33. Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithm
34. Fighting Pirates 2.0
35. Traitor Tracing against Public Collaboration
36. Constructions of almost secure frameproof codes with applications to fingerprinting schemes.
37. A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
38. Estimating the Minimal Length of Tardos Code
39. Defending against the Pirate Evolution Attack
40. Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
41. Traitor Tracing with Optimal Transmission Rate
42. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
43. A Colorization Based Animation Broadcast System with Traitor Tracing Capability
44. Perturbing and Protecting a Traceable Block Cipher
45. Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
46. Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
47. Improved Algebraic Traitor Tracing Scheme
48. A Traceable Block Cipher
49. A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing
50. Blind 3D-Printing Watermarking Using Moment Alignment and Surface Norm Distribution
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.