Pirate Evolution: How to Make the Most of Your Traitor Keys
From MaRDI portal
Publication:3612564
DOI10.1007/978-3-540-74143-5_25zbMath1215.94057OpenAlexW1526345135MaRDI QIDQ3612564
Serdar Pehlivanoglu, Aggelos Kiayias
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_25
Related Items
Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Fighting Pirates 2.0, Defending against the Pirate Evolution Attack, Traitors Collaborating in Public: Pirates 2.0, Identity-Based Trace and Revoke Schemes, Anonymous trace and revoke