共 50 条
- [1] New traitor tracing scheme against anonymous attack [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +
- [2] EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 270 - 273
- [3] Renewable traitor tracing: A trace-revoke-trace system for anonymous attack [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 563 - +
- [4] Unifying Broadcast Encryption and Traitor Tracing for Content Protection [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 139 - 148
- [5] Flexible traitor tracing for anonymous attacks [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 269 - 270
- [6] A closer look at broadcast encryption and traitor tracing for content protection [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 295 - 298
- [7] An anonymous asymmetric public key traitor tracing scheme [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 104 - 114
- [8] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 388 - 419
- [9] Traitor tracing scheme and digital copyright protection [J]. Jisuanji Gongcheng, 2006, 2 (151-152):
- [10] Forgery attack to an asymptotically optimal traitor tracing scheme [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 171 - +