Author:
Wu Yong-Dong,Deng Robert H.
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference32 articles.
1. Kiayias A, Yung M. On crafty pirates and foxy tracers. In ACM Workshop in Digital Rights Management (DRM 2001), Philadelphia, USA, Nov. 5, 2002, Revised Papers, LNCS 2320, pp.22–39.
2. Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing. In Proc. CRYPTO 2001, Santa Barbara, USA, Aug. 19–23, 2001, pp.63–79.
3. Pfitzmann B. Trails of traced traitors. In Information Hiding Workshop, Cambridge, UK, May 30-June 1, 1996, LNCS 1174, pp.49–64.
4. Yan J J, Wu Y. An attack on a traitor tracing scheme. Technical Report No.518, Computer Lab., Univ. Cambridge, 2001.
5. Boneh D, Franklin M. An efficient public key traitor tracing scheme. In Proc. Crypto 1999, Santa Barbara, USA, Aug. 15–19, 1999, LNCS 1666, pp.338–353.