Sciweavers

55 search results - page 1 / 11
» Attribute-Based Traitor Tracing
Sort
View
JISE
2011
116views more  JISE 2011»
13 years 5 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 4 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ICASSP
2011
IEEE
13 years 2 months ago
Group testing meets traitor tracing
This paper links two a priori different topics, group testing and traitor tracing. Group testing, as an instantiation of a compressed sensing problem over binary data, is indeed e...
Peter Meerwald, Teddy Furon
CSREASAM
2003
14 years 8 days ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
14 years 5 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech