Sciweavers

137 search results - page 7 / 28
» Hybrid Traitor Tracing
Sort
View
CCS
2010
ACM
13 years 7 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
JISE
2011
116views more  JISE 2011»
13 years 2 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen
TELSYS
2010
76views more  TELSYS 2010»
13 years 2 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
ICICS
2003
Springer
14 years 21 days ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
EUROCRYPT
2008
Springer
13 years 9 months ago
Key Recovery on Hidden Monomial Multivariate Schemes
Abstract. The problem we study in this paper is the key recovery problem on the C schemes and generalizations where the quadratic monomial of C (the product of two linear monomials...
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques S...