Traitor tracing

Results: 19



#Item
1

Hardness of k-LWE and Applications in Traitor Tracing

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2015-07-29 05:15:14
    2

    Hardness of k-LWE and Applications in Traitor Tracing San Ling1 , Duong Hieu Phan2 , Damien Stehlé3 , and Ron Steinfeld4 1 3

    Add to Reading List

    Source URL: users.monash.edu.au

    Language: English - Date: 2014-07-03 23:35:40
      3

      Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg1? , Jessica Staddon2?? , and Judy L. Walker3? ? ? 1 Department of Mathematics

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2006-12-12 19:25:24
        4License / Computer law / Software licenses / Law / Business / Vehicle registration plate / Traitor tracing / Strategic management / Free software licenses / Business law

        Order Form Single-User and Multi-User Licenses Please complete this form and return with payment to the address at the bottom of the page. To purchase with a credit card, please visit www.handygraph.com. 1. Quantity and

        Add to Reading List

        Source URL: www.handygraph.com

        Language: English - Date: 2009-06-03 13:42:06
        5Software licenses / Installation software / Computer virus / Product activation / Installation / Windows XP / Microsoft Windows / Traitor tracing / System software / Software / Antivirus software

        RJS VERIFIER COMPUTER INTERFACE REPORT (VCIR) SETUP Applies to Part NumberNOTE: Some anti-virus software programs will identify our software licensing program as a potential virus. You may need to add an except

        Add to Reading List

        Source URL: www.rjs1.com

        Language: English - Date: 2012-12-14 14:56:13
        6Free software / Software / Law / Internet privacy / Computing / Traitor tracing / Microsoft Product Activation / Software licenses / Product activation / Software development process

        Software Activation Explained What is software activation? Obtaining the consent of users Software activation is a method some software

        Add to Reading List

        Source URL: www.siprofessionals.org

        Language: English - Date: 2009-07-07 13:00:12
        7Formal languages / Mathematics / Longest common substring problem / Substring / Linguistics / Orbifold / Comparison of programming languages / Combinatorics / String / Dynamic programming

        Traitor-Tracing on Binary Strings Michael J. Collins Sandia National Laboratories⋆ Albuquerque, NM USA 87185

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2009-12-23 13:49:52
        8Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

        Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2006-12-04 09:17:42
        9Computer law / Installation software / Law / Proprietary software / Shareware / Installation / Traitor tracing / MediaMax CD-3 / Software licenses / System software / Software

        PSListener Help ManualPeer Software Inc. All Rights Reserved. Updated Wednesday, February 25, 2015 2

        Add to Reading List

        Source URL: www.peersoftware.com

        Language: English - Date: 2015-02-25 22:17:29
        10Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

        On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

        Add to Reading List

        Source URL: www.nik.no

        Language: English - Date: 2005-12-08 10:13:37
        UPDATE