Sciweavers

62 search results - page 7 / 13
» Trade-Off Traitor Tracing
Sort
View
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
14 years 3 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
ISW
2007
Springer
14 years 5 months ago
Traitor Tracing with Optimal Transmission Rate
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
14 years 7 days ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall
CCS
2010
ACM
13 years 11 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
JISE
2011
116views more  JISE 2011»
13 years 5 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen