Traitor Tracing for Shortened and Corrupted Fingerprints
From MaRDI portal
Publication:3082984
DOI10.1007/978-3-540-44993-5_6zbMath1327.94072OpenAlexW1510640641MaRDI QIDQ3082984
Yejing Wang, Reihaneh Safavi-Naini
Publication date: 18 March 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-44993-5_6
Related Items (4)
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes ⋮ On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ On 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capability ⋮ Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: Traitor Tracing for Shortened and Corrupted Fingerprints