Information and Communications Security
From MaRDI portal
Publication:5464784
DOI10.1007/B101042zbMATH Open1109.68450OpenAlexW4206056219MaRDI QIDQ5464784FDOQ5464784
Authors: Marcel Fernández, Miguel Soriano
Publication date: 19 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b101042
Recommendations
- Identifying Traitors Using the Koetter–Vardy Algorithm
- Progress in Cryptology - INDOCRYPT 2004
- Tracing traitors
- Publication:4940701
- Identity-Based Traitor Tracing
- Sequential traitor tracing
- scientific article; zbMATH DE number 1759787
- Traitor tracing against public collaboration
- Identification of Traitors in Algebraic-Geometric Traceability Codes
- Trade-Off Traitor Tracing
Data encryption (aspects in computer science) (68P25) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Cited In (5)
- Title not available (Why is that?)
- Traitor tracing for shortened and corrupted fingerprints
- Progress in Cryptology - INDOCRYPT 2004
- Information Security Practice and Experience
- On the tracing traitors math. Dedicated to the memory of Bob Blakley -- pioneer of digital fingerprinting and inventor of secret sharing
This page was built for publication: Information and Communications Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5464784)