Author:
Weng Jian,Liu ShengLi,Chen KeFei
Publisher
Springer Science and Business Media LLC
Reference10 articles.
1. LNCS;S. Berkovits,1991
2. LNCS;A. Fiat,1993
3. Boneh D, Franklin M. An efficient public key traitor scheme. In: Proceedings of Crypto’99, LNCS 1666. Berlin: Springer, 1999. 338–353
4. Chor B, Fiat A, Naor M, et al. Traitor tracing. IEEE Trans Inf Theory, 2000, 46(3): 893–910
5. LNCS;B. Chor,1994
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Broadcast encryption schemes based on RSA;The Journal of China Universities of Posts and Telecommunications;2009-02