Cryptography Reference
In-Depth Information
101. R. Safavi-Naini and Y. Wang. Traitor tracing for shortened and corrupted
fingerprints. In Feigenbaum [ 41 ], pages 81-100.
102. R. Safavi-Naini and Y. Wang. Sequential traitor tracing. IEEE Transactions
on Information Theory, 49(5):1319-1326, 2003.
103. R. Sakara and J. Furukawa. Identity-based broadcast encryption, 2007. Avail-
able at the IACR Crypto Archive http://eprint.iacr.org.
104. T. Sander, editor. Security and Privacy in Digital Rights Management, ACM
CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Re-
vised Papers, volume 2320 of Lecture Notes in Computer Science. Springer,
2002.
105. B. S. W. Schroder. Ordered Sets: An Introduction. Birkhauser, Boston, 2003.
106. A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO,
pages 47-53, 1984.
107. A. T. Sherman and D. A. McGrew. Key establishment in large dynamic groups
using one-way function trees. IEEE Trans. Software Eng., 29(5):444-458, 2003.
108. V. Shoup. A proposal for an iso standard for public key encryption (version
1.1), 2001.
109. V. Shoup, editor. Advances in Cryptology - CRYPTO 2005: 25th Annual In-
ternational Cryptology Conference, Santa Barbara, California, USA, August
14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science.
Springer, 2005.
110. A. Silverberg, J. Staddon, and J. L. Walker. E cient traitor tracing algorithms
using list decoding. In C. Boyd, editor, ASIACRYPT, volume 2248 of Lecture
Notes in Computer Science, pages 175-192. Springer, 2001.
111. J. Staddon, D. R. Stinson, and R. Wei. Combinatorial properties of frameproof
and traceability codes. IEEE Transactions on Information Theory, 47(3):1042-
1049, 2001.
112. D. R. Stinson, editor. Advances in Cryptology - CRYPTO '93, 13th Annual
International Cryptology Conference, Santa Barbara, California, USA, August
22-26, 1993, Proceedings, volume 773 of Lecture Notes in Computer Science.
Springer, 1994.
113. D. R. Stinson and R. Wei. Combinatorial properties and constructions of
traceability schemes and frameproof codes. SIAM J. Discrete Math., 11(1):41-
53, 1998.
114. D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast
encryption. In S. E. Tavares and H. Meijer, editors, Selected Areas in Cryp-
tography, volume 1556 of Lecture Notes in Computer Science, pages 144-156.
Springer, 1998.
115. G. Tardos. Optimal probabilistic fingerprint codes. In STOC, pages 116-125.
ACM, 2003.
116. G. Tardos. Optimal probabilistic fingerprint codes. J. ACM, 55(2), 2008.
117. O. Telelis and V. Zissimopoulos. Absolute o(log m) error in approximating
random set covering: an average case analysis. Inf. Process. Lett., 94(4):171-
177, 2005.
118. V. D. To and R. Safavi-Naini. Linear code implies public-key traitor trac-
ing with revocation. In H. Wang, J. Pieprzyk, and V. Varadharajan, edi-
tors, ACISP, volume 3108 of Lecture Notes in Computer Science, pages 24-35.
Springer, 2004.
 
 
 
Search WWH ::




Custom Search