Sciweavers

62 search results - page 7 / 13
» Trade-Off Traitor Tracing
Sort
View
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
15 years 7 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
ISW
2007
Springer
15 years 10 months ago
Traitor Tracing with Optimal Transmission Rate
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
15 years 5 months ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall
CCS
2010
ACM
15 years 3 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
JISE
2011
116views more  JISE 2011»
14 years 10 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen