Defending against the pirate evolution attack
DOI10.1504/IJACT.2010.033796zbMATH Open1195.94060OpenAlexW2151610459MaRDI QIDQ5962409FDOQ5962409
Jeffrey Lotspiech, Hongxia Jin, Serdar Pehlivanoglu
Publication date: 22 September 2010
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2010.033796
Recommendations
- Defending against the Pirate Evolution Attack
- Evolution of defence portfolios in exploiter-victim systems
- scientific article; zbMATH DE number 1842486
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Fighting Pirates 2.0
- Defending against multiple different attackers
- Evasion policies for a vessel being chased by pirate skiffs
- An evolutionary system architecture for information protection
cryptographybroadcast encryptiontraitor tracingsubset differencepirate evolution attackscontent protection standardshigh definition DVDsrevocation efficiencytrace and revoke schemes
Cited In (2)
This page was built for publication: Defending against the pirate evolution attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5962409)