Defending against the Pirate Evolution Attack
From MaRDI portal
Publication:3618672
DOI10.1007/978-3-642-00843-6_14zbMath1273.94351OpenAlexW1751643691MaRDI QIDQ3618672
Hongxia Jin, Jeffrey Lotspiech
Publication date: 2 April 2009
Published in: Information Security Practice and Experience (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00843-6_14
Related Items (2)
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ Identity-Based Trace and Revoke Schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Combinatorial properties of frameproof and traceability codes
- Tracing traitors
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
This page was built for publication: Defending against the Pirate Evolution Attack