Information and Communications Security
From MaRDI portal
Publication:5464784
Recommendations
- Identifying Traitors Using the Koetter–Vardy Algorithm
- Progress in Cryptology - INDOCRYPT 2004
- Tracing traitors
- Publication:4940701
- Identity-Based Traitor Tracing
- Sequential traitor tracing
- scientific article; zbMATH DE number 1759787
- Traitor tracing against public collaboration
- Identification of Traitors in Algebraic-Geometric Traceability Codes
- Trade-Off Traitor Tracing
Cited in
(5)- scientific article; zbMATH DE number 1696657 (Why is no real title available?)
- Traitor tracing for shortened and corrupted fingerprints
- Progress in Cryptology - INDOCRYPT 2004
- Information Security Practice and Experience
- On the tracing traitors math. Dedicated to the memory of Bob Blakley -- pioneer of digital fingerprinting and inventor of secret sharing
This page was built for publication: Information and Communications Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5464784)