Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Information Systems,Software
Reference27 articles.
1. International Intellectual Property Alliance, fact sheet. http://www.iipa.com/aboutiipa.html
2. Barg A., Blakley G.R. and Kabatiansky G.A. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4): 852–865
3. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology—CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
4. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998). Presented in part at CRYPTO’95
5. Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 257–270. Springer Heidelberg (1994)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献