Cryptography Reference
In-Depth Information
119. D. Tonien and R. Safavi-Naini. An e cient single-key pirates tracing scheme
using cover-free families. In J. Zhou, M. Yung, and F. Bao, editors, ACNS,
volume 3989 of Lecture Notes in Computer Science, pages 82-97, 2006.
120. N. R. Wagner. Fingerprinting. In IEEE Symposium on Security and Privacy,
pages 18-22, 1983.
121. D. M. Wallner, E. J. Harder, and R. C. Agee. Key management for multicast:
issues and architectures, 1999. Internet Draft.
122. P. Wang, P. Ning, and D. S. Reeves. Storage-e cient stateless group key
revocation. In K. Zhang and Y. Zheng, editors, ISC, volume 3225 of Lecture
Notes in Computer Science, pages 25-38. Springer, 2004.
123. Y. Watanabe, G. Hanaoka, and H. Imai. E cient asymmetric public-key traitor
tracing without trusted agents. In Naccache [ 86 ] , pages 392-407.
124. M. J. Wiener, editor. Advances in Cryptology - CRYPTO '99, 19th Annual
International Cryptology Conference, Santa Barbara, California, USA, August
15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science.
Springer, 1999.
125. C. K. Wong, M. G. Gouda, and S. S. Lam. Secure group communications using
key graphs. In SIGCOMM, pages 68-79, 1998.
126. Y. Yacobi.
Improved boneh-shaw content fingerprinting.
In Naccache [ 86 ],
pages 378-391.
 
Search WWH ::




Custom Search