共 50 条
- [32] Improving the Boneh-Franklin Traitor Tracing Scheme [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 88 - +
- [33] An anonymous asymmetric public key traitor tracing scheme [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 104 - 114
- [34] Analysis of Set-cover traitor tracing scheme [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 512 - 517
- [35] Forgery attack to an asymptotically optimal traitor tracing scheme [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 171 - +
- [36] A secure traitor tracing scheme against key exposure [J]. 2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 1873 - 1877
- [38] A traitor tracing scheme based on RSA for fast decryption [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 56 - 74
- [39] A New Multi-service Token Bucket-Shaping Scheme Based on 802.11e [J]. 2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, : 197 - 200