Funder
Japan Society for the Promotion of Science
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference16 articles.
1. Alon N., Fischer E., Szegedy M.: Parent-identifying codes. J. Comb. Theory A 95(2), 349–359 (2001).
2. Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998).
3. Chor B., Fiat A., Naor M.: Tracing traitors. Advances in Crytology (Lecture Notes in Computer Science), pp. 480–491. Springer-Verlag, Berlin, Germany (1994).
4. Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000).
5. Collins M.J.: Upper bounds for parent-identifying set systems. Des. Codes Cryptogr. 51(2), 167–173 (2009).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献