Guessing secrets efficiently via list decoding
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Binary Codes for Collusion-Secure Fingerprinting
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Reed Solomon Codes for Digital Fingerprinting
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
An upper bound on the size of a code with the k-identifiable parent property
Journal of Combinatorial Theory Series A
Intersecting codes and separating codes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Generalized hashing and parent-identifying codes
Journal of Combinatorial Theory Series A
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
The Lovász Local Lemma and Its Applications to some Combinatorial Arrays
Designs, Codes and Cryptography
On a Bound of Cover-Free Families
Designs, Codes and Cryptography
A class of I.P.P. codes with efficient identification
Journal of Complexity - Special issue on coding and cryptography
New Constructions for IPP Codes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Codes for Copyright Protection: The Case of Two Pirates
Problems of Information Transmission
Explicit constructions of separating hash families from algebraic curves over finite fields
Designs, Codes and Cryptography
Jack van Lint (1932-2004): a survey of his scientific work
Journal of Combinatorial Theory Series A - Special issue in honor of Jacobus H. van Lint
On optimal codes with w-identifiable parent property
Designs, Codes and Cryptography
Guessing secrets efficiently via list decoding
ACM Transactions on Algorithms (TALG)
On generalized separating hash families
Journal of Combinatorial Theory Series A
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Designs, Codes and Cryptography
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Traitors Collaborating in Public: Pirates 2.0
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Equal-Weight Fingerprinting Codes
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Combining Tardos fingerprinting codes and fingercasting
IH'07 Proceedings of the 9th international conference on Information hiding
Journal of Combinatorial Theory Series A
Proceedings of the 12th ACM workshop on Multimedia and security
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
Mediated traceable anonymous encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Bounds for separating hash families
Journal of Combinatorial Theory Series A
Digital fingerprinting under and (somewhat) beyond the marking assumption
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Tracing traitors by guessing secrets. the q-ary case
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Identification algorithms for sequential traitor tracing
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
General Theory of Information Transfer and Combinatorics
Codes with the identifiable parent property and the multiple-access channel
General Theory of Information Transfer and Combinatorics
Codes based tracing and revoking scheme with constant ciphertext
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Improved bounds for separating hash families
Designs, Codes and Cryptography
Hi-index | 0.00 |