1. Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998). See also Proceedings of the Crypto 95. Springer LNCS, vol. 963, pp. 452–465 (1995).
2. Chor B., Fiat A., Naor M.: Tracing traitors. In: Proceedings of the Crypto 94. Springer LNCS, vol. 839, pp. 257–270 (1994). For a full version see [3].
3. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46(3), 893–910 (2000)
4. Cox I.J., Kilian J., Leighton T., Shamoon T.: A secure, robust watermark for multimedia. In: Information Hiding. Springer LNCS, vol. 174, pp. 185–226 (1996).
5. Fiat A., Tassa T.: Dynamic traitor tracing. J Cryptol. 14(3), 211–223 (2001). See also Proceedings of the Crypto 99. Springer LNCS, vol. 1666, pp. 537–554 (1999).