Sciweavers

55 search results - page 6 / 11
» Attribute-Based Traitor Tracing
Sort
View
EUROCRYPT
2005
Springer
14 years 1 months ago
Public Traceability in Traitor Tracing Schemes
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate dec...
Hervé Chabanne, Duong Hieu Phan, David Poin...
ICASSP
2008
IEEE
14 years 2 months ago
Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation
We pose the problem of tracing traitors, who have colluded to circumvent a multimedia fingerprinting system, as a sparse underdetermined linear problem. We propose a range of det...
David P. Varodayan, Christine Pépin
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 11 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
INDOCRYPT
2007
Springer
14 years 1 months ago
Trade-Off Traitor Tracing
Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki ...
ISW
2007
Springer
14 years 1 months ago
Traitor Tracing with Optimal Transmission Rate
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan