Short c-secure fingerprinting codes
From MaRDI portal
Publication:3404422
Recommendations
Cited in
(14)- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
- Information Security Practice and Experience
- Optimal probabilistic fingerprint codes
- Improvement of collusion secure convolutional fingerprinting information codes
- scientific article; zbMATH DE number 2079373 (Why is no real title available?)
- Digital fingerprinting codes: problem statements, constructions, identification of traitors
- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes
- scientific article; zbMATH DE number 1980958 (Why is no real title available?)
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- scientific article; zbMATH DE number 1893222 (Why is no real title available?)
- scientific article; zbMATH DE number 1406778 (Why is no real title available?)
- scientific article; zbMATH DE number 1950352 (Why is no real title available?)
- scientific article; zbMATH DE number 1955789 (Why is no real title available?)
- An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths
This page was built for publication: Short \(c\)-secure fingerprinting codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3404422)