scientific article; zbMATH DE number 2087909
From MaRDI portal
Publication:4738936
zbMath1048.68802MaRDI QIDQ4738936
Aggelos Kiayias, Mordechai M. Yung
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2320/23200022.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items
Hardness of \(k\)-LWE and applications in traitor tracing, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Scalable public-key tracing and revoking, Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard, Traitors Collaborating in Public: Pirates 2.0, Efficient Traitor Tracing from Collusion Secure Codes