Sciweavers

56 search results - page 7 / 12
» Identity-Based Traitor Tracing
Sort
View
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
15 years 1 months ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall
CCS
2010
ACM
14 years 12 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
76
Voted
JISE
2011
116views more  JISE 2011»
14 years 6 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen
TELSYS
2010
76views more  TELSYS 2010»
14 years 6 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
ICICS
2003
Springer
15 years 4 months ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng