Pirate Evolution: How to Make the Most of Your Traitor Keys
From MaRDI portal
Publication:3612564
DOI10.1007/978-3-540-74143-5_25zbMath1215.94057OpenAlexW1526345135MaRDI QIDQ3612564
Serdar Pehlivanoglu, Aggelos Kiayias
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_25
Related Items (7)
Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ Fighting Pirates 2.0 ⋮ Defending against the Pirate Evolution Attack ⋮ Traitors Collaborating in Public: Pirates 2.0 ⋮ Identity-Based Trace and Revoke Schemes ⋮ Anonymous trace and revoke
This page was built for publication: Pirate Evolution: How to Make the Most of Your Traitor Keys