Subject
Law,Hardware and Architecture,Software
Reference28 articles.
1. Collusion-secure fingerprinting for digital data;Boneh,1995
2. Tracing traitors;Chor,1994
3. A. Fiat, M. Naor, “Broadcast Encryption”, CRYPTO’93, pp. 480–491.
4. Some new results on key distribution patterns and broadcast encryption;Stinson;Designs, Codes and Cryptography,1998
5. On some methods for unconditionally secure key distribution and broadcast encryption;Stinson;Design, Codes and Cryptography,1997
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. References;Illegal Online File Sharing, Decision-Analysis, and the Pricing of Digital Goods;2016-10-18