Exploració per tema "Data Encryption"
Ara es mostren els items 1-3 de 3
-
A new class of codes for fingerprinting schemes
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
Tracing traitors by guessing secrets. The q-ary case
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...