Sciweavers

55 search results - page 7 / 11
» Attribute-Based Traitor Tracing
Sort
View
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
13 years 9 months ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall
CCS
2010
ACM
13 years 7 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
TELSYS
2010
76views more  TELSYS 2010»
13 years 2 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
ICICS
2003
Springer
14 years 25 days ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
EUROCRYPT
2008
Springer
13 years 9 months ago
Key Recovery on Hidden Monomial Multivariate Schemes
Abstract. The problem we study in this paper is the key recovery problem on the C schemes and generalizations where the quadratic monomial of C (the product of two linear monomials...
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques S...