• A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • An agent-based simulation model of a market for dynamic spectrum access 

      López Berga, Ester; Murcia, César; Beltran, Fernando (2011)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The dramatic increase in the demand for spectrum-based services and devices, combined with the long-term exclusive model of spectrum management, has led to an apparent spectrum scarcity. To overcome this scarcity, the ...
    • Tracing traitors by guessing secrets. The q-ary case 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...