Sciweavers

54 search results - page 7 / 11
» Tracing Traitors
Sort
View
69
Voted
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
15 years 1 months ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall
68
Voted
CCS
2010
ACM
14 years 12 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
76
Voted
JISE
2011
116views more  JISE 2011»
14 years 6 months ago
Attribute-Based Traitor Tracing
Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen
TELSYS
2010
76views more  TELSYS 2010»
14 years 6 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
ICIP
2005
IEEE
16 years 1 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu