On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
From MaRDI portal
Publication:3005592
DOI10.1007/978-3-642-20901-7_14zbMath1272.94042OpenAlexW59260207MaRDI QIDQ3005592
Publication date: 8 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20901-7_14
Cites Work
- Public Key Broadcast Encryption for Stateless Receivers
- Traitor Tracing for Shortened and Corrupted Fingerprints
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Defending against the Pirate Evolution Attack
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Combinatorial properties of frameproof and traceability codes
- New results on frame-proof codes and traceability schemes
- Tracing traitors
- Collusion-secure fingerprinting for digital data
- Public Traceability in Traitor Tracing Schemes
- One-Way Chain Based Broadcast Encryption Schemes
- Information Security
- Scalable public-key tracing and revoking
- Optimal probabilistic fingerprint codes
- Dynamic traitor tracing
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems