Traitor tracing for prerecorded and recordable media
Proceedings of the 4th ACM workshop on Digital rights management
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Sliding-window dynamic frameproof codes
Designs, Codes and Cryptography
Sequential and dynamic frameproof codes
Designs, Codes and Cryptography
A tree-based scheme for security of many-to-many communications
Journal of High Speed Networks - Broadband Multimedia Sensor Networks in Healthcare Applications
Privacy, traceability, and anonymity for content protection
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Traitor Tracing without A Priori Bound on the Coalition Size
ISC '09 Proceedings of the 12th International Conference on Information Security
New traceability codes against a generalized collusion attack for digital fingerprinting
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
Efficient traitor tracing for clone attack in content protection
Proceedings of the 2011 ACM Symposium on Applied Computing
Practical scenarios for the van trung-martirosyan codes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Practical forensic analysis in advanced access content system
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Dynamic fingerprinting over broadcast using revocation scheme
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Tracing traitors by guessing secrets. the q-ary case
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Identification algorithms for sequential traitor tracing
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Renewable traitor tracing: a trace-revoke-trace system for anonymous attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 754.84 |
We consider a new type of traitor tracing scheme, called sequential traitor tracing, that protects against rebroadcasting of decrypted content. Sequential traceability (TA) schemes trace all up to c traitors and remove the shortcomings of dynamic tracing schemes. We give two general constructions and show the relationship between c-TA codes and sequential tracing schemes.