The following pages link to (Q4343416):
Displaying 24 items.
- Almost separating and almost secure frameproof codes over \(q\)-ary alphabets (Q300380) (← links)
- Black-box Trace\&Revoke codes (Q378263) (← links)
- Solutions to the anti-piracy problem in oblivious transfer (Q899580) (← links)
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures (Q1569877) (← links)
- Frameproof codes against limited coalitions of pirates (Q1605345) (← links)
- Constructions of almost secure frameproof codes with applications to fingerprinting schemes (Q1741920) (← links)
- Intersecting codes and separating codes (Q1811095) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings (Q2096502) (← links)
- Traceable secret sharing and applications (Q2129017) (← links)
- Binary fingerprinting codes (Q2486878) (← links)
- A public-key traitor tracing scheme with revocation using dynamic shares (Q2572960) (← links)
- (Q2741412) (← links)
- Communication Optimal Tardos-Based Asymmetric Fingerprinting (Q2790060) (← links)
- Synchronized Regular Expressions (Q2841278) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Traitors Collaborating in Public: Pirates 2.0 (Q3627435) (← links)
- Protocols for collusion-secure asymmetric fingerprinting (Q5048941) (← links)
- Traceable PRFs: Full Collusion Resistance and Active Security (Q5087266) (← links)
- Efficient Traitor Tracing from Collusion Secure Codes (Q5502800) (← links)
- Some new \(p\)-ary two-secure frameproof codes (Q5938899) (← links)
- Traceable secret sharing: strong security and efficient constructions (Q6652970) (← links)
- Accountability for misbehavior in threshold decryption via threshold traitor tracing (Q6653012) (← links)