Sciweavers

AAAI
2007
13 years 7 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
13 years 11 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech