Sciweavers

2821 search results - page 1 / 565
» Tracing a single user
Sort
View
EJC
2006
13 years 4 months ago
Tracing a single user
Let g(n, r) be the maximum possible cardinality of a family F of subsets of {1, 2, . . . , n} so that given a union of at most r members of F, one can identify at least one of the...
Noga Alon, Vera Asodi
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
13 years 8 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
KBSE
2007
IEEE
13 years 11 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
AVI
2004
13 years 6 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
13 years 10 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee