ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
Abstract. In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be u...
Marcel Fernandez, Miguel Soriano, Josep Cotrina Na...
Abstract. The automotive industry has developed electronic immobilizers to reduce the number of car thefts since the mid nineties. However, there is not much information on the cur...
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian St&uu...
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...