scientific article; zbMATH DE number 7051201
From MaRDI portal
Publication:4633842
zbMath1422.68067MaRDI QIDQ4633842
Publication date: 6 May 2019
Full work available at URL: https://dl.acm.org/citation.cfm?id=1496808
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Other types of codes (94B60) Authentication, digital signatures and secret sharing (94A62)
Related Items (7)
Making \textit{any} attribute-based encryption accountable, efficiently ⋮ Optimal symmetric Tardos traitor tracing schemes ⋮ Binary and \(q\)-ary Tardos codes, revisited ⋮ False negative probabilities in Tardos codes ⋮ Communication Optimal Tardos-Based Asymmetric Fingerprinting ⋮ Collusion resistant watermarkable PRFs from standard assumptions ⋮ False positive probabilities in \(q\)-ary Tardos codes: comparison of attacks
This page was built for publication: