共 50 条
- [41] GROUP TESTING MEETS TRAITOR TRACING [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 4204 - 4207
- [42] Public traceability in traitor tracing schemes [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 542 - 558
- [43] Traitor Tracing with Constant Size Ciphertext [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 501 - 510
- [45] Dynamic Tardos Traitor Tracing Schemes [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (07) : 4230 - 4242
- [46] Efficient coalition detection in traitor tracing [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 365 - +
- [47] Traitor tracing with constant transmission rate [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 450 - 465
- [48] Traitor tracing against powerful attacks [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1878 - 1882
- [49] Bayesian methods for practical traitor tracing [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 194 - +
- [50] Traitor tracing for shortened and corrupted fingerprints [J]. DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 81 - 100