Exploració per tema "Management of Computing and Information Systems"
Ara es mostren els items 1-4 de 4
-
A new class of codes for fingerprinting schemes
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
An agent-based simulation model of a market for dynamic spectrum access
(2011)
Text en actes de congrés
Accés restringit per política de l'editorialThe dramatic increase in the demand for spectrum-based services and devices, combined with the long-term exclusive model of spectrum management, has led to an apparent spectrum scarcity. To overcome this scarcity, the ... -
Tracing traitors by guessing secrets. The q-ary case
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...