Sciweavers

137 search results - page 7 / 28
» Hybrid Traitor Tracing
Sort
View
CCS
2010
ACM
14 years 9 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
JISE
2011
116views more  JISE 2011»
14 years 4 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen
TELSYS
2010
76views more  TELSYS 2010»
14 years 4 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
ICICS
2003
Springer
15 years 2 months ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
EUROCRYPT
2008
Springer
14 years 11 months ago
Key Recovery on Hidden Monomial Multivariate Schemes
Abstract. The problem we study in this paper is the key recovery problem on the C schemes and generalizations where the quadratic monomial of C (the product of two linear monomials...
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques S...