共 50 条
- [31] Traitor Tracing with Constant Size Ciphertext CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 501 - 510
- [33] Public traceability in traitor tracing schemes ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 542 - 558
- [35] Traitor tracing for shortened and corrupted fingerprints DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 81 - 100
- [37] Traitor tracing with constant transmission rate ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 450 - 465
- [38] Flexible traitor tracing for anonymous attacks COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 269 - 270
- [39] Traitor tracing against powerful attacks 2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1878 - 1882
- [40] Bayesian methods for practical traitor tracing APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 194 - +