Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Signal Processing
Reference40 articles.
1. R Dorfman, The detection of defective members of large populations. Ann. Math. Stat. 14(4), 436–440 (1943).
2. D Boneh, J Shaw, Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory. 44(5), 1897–1905 (1998). doi: 10.1109/18.705568 .
3. G Tardos, in STOC. Optimal probabilistic fingerprint codes, (2003), pp. 116–125. doi: 10.1145/780542.780561 .
4. E Amiri, G Tardos, in SODA. High rate fingerprinting codes and the fingerprinting capacity (SIAMPhiladelphia, PA, USA, 2009), pp. 336–345.
5. Y-W Huang, P Moulin, On the saddle-point solution and the large-coalition asymptotics of fingerprinting games. IEEE Trans. Inf. Forensics Secur. 7(1), 160–175 (2012). doi: 10.1109/TIFS.2011.2168212 .
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献