Traitor tracing

Results: 19



#Item
1Hardness of  k-LWE and Applications in Traitor Tracing

Hardness of k-LWE and Applications in Traitor Tracing

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2015-07-29 05:15:14
    2Hardness of k-LWE and Applications in Traitor Tracing San Ling1 , Duong Hieu Phan2 , Damien Stehlé3 , and Ron Steinfeld4 1 3

    Hardness of k-LWE and Applications in Traitor Tracing San Ling1 , Duong Hieu Phan2 , Damien Stehlé3 , and Ron Steinfeld4 1 3

    Add to Reading List

    Source URL: users.monash.edu.au

    Language: English - Date: 2014-07-03 23:35:40
      3Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg1? , Jessica Staddon2?? , and Judy L. Walker3? ? ? 1  Department of Mathematics

      Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg1? , Jessica Staddon2?? , and Judy L. Walker3? ? ? 1 Department of Mathematics

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2006-12-12 19:25:24
        4Order Form Single-User and Multi-User Licenses Please complete this form and return with payment to the address at the bottom of the page. To purchase with a credit card, please visit www.handygraph.com. 1. Quantity and

        Order Form Single-User and Multi-User Licenses Please complete this form and return with payment to the address at the bottom of the page. To purchase with a credit card, please visit www.handygraph.com. 1. Quantity and

        Add to Reading List

        Source URL: www.handygraph.com

        Language: English - Date: 2009-06-03 13:42:06
        5RJS VERIFIER COMPUTER INTERFACE REPORT (VCIR) SETUP Applies to Part NumberNOTE: Some anti-virus software programs will identify our software licensing program as a potential virus. You may need to add an except

        RJS VERIFIER COMPUTER INTERFACE REPORT (VCIR) SETUP Applies to Part NumberNOTE: Some anti-virus software programs will identify our software licensing program as a potential virus. You may need to add an except

        Add to Reading List

        Source URL: www.rjs1.com

        Language: English - Date: 2012-12-14 14:56:13
        6Software Activation Explained What is software activation? Obtaining the consent of users  Software activation is a method some software

        Software Activation Explained What is software activation? Obtaining the consent of users Software activation is a method some software

        Add to Reading List

        Source URL: www.siprofessionals.org

        Language: English - Date: 2009-07-07 13:00:12
        7Traitor-Tracing on Binary Strings Michael J. Collins Sandia National Laboratories⋆ Albuquerque, NM USA 87185

        Traitor-Tracing on Binary Strings Michael J. Collins Sandia National Laboratories⋆ Albuquerque, NM USA 87185

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2009-12-23 13:49:52
        8Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

        Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2006-12-04 09:17:42
        9PSListener Help ManualPeer Software Inc. All Rights Reserved. Updated Wednesday, February 25, 2015 2

        PSListener Help ManualPeer Software Inc. All Rights Reserved. Updated Wednesday, February 25, 2015 2

        Add to Reading List

        Source URL: www.peersoftware.com

        Language: English - Date: 2015-02-25 22:17:29
        10Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

        On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

        Add to Reading List

        Source URL: www.nik.no

        Language: English - Date: 2005-12-08 10:13:37