Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Efficient dynamic traitor tracing
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Key Preassigned Traceability Schemes for Broadcast Encryption
SAC '98 Proceedings of the Selected Areas in Cryptography
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Self Protecting Pirates and Black-Box Traitor Tracing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Traitor Tracing with Constant Transmission Rate
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Customer Identification for MPEG Video Based on Digital Fingerprinting
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
Designs, Codes and Cryptography
From digital audiobook to secure digital multimedia-book
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
EURASIP Journal on Applied Signal Processing
Efficient Traitor Tracing from Collusion Secure Codes
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Traitors Collaborating in Public: Pirates 2.0
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Extracting group signatures from traitor tracing schemes
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Forgery attack to an asymptotically optimal traitor tracing scheme
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Pirate evolution: how to make the most of your traitor keys
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Proceedings of the 17th ACM conference on Computer and communications security
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Designs, Codes and Cryptography
On the effects of pirate evolution on the design of digital content distribution systems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Practical pay-TV scheme using traitor tracing scheme for multiple channels
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |