Sciweavers

54 search results - page 6 / 11
» Tracing Traitors
Sort
View
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
14 years 1 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
ICICS
2003
Springer
14 years 29 days ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 12 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
INDOCRYPT
2007
Springer
14 years 1 months ago
Trade-Off Traitor Tracing
Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki ...
ISW
2007
Springer
14 years 1 months ago
Traitor Tracing with Optimal Transmission Rate
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan