Mostra el registre d'ítem simple
Tracing traitors by guessing secrets. The q-ary case
dc.contributor.author | Fernández Muñoz, Marcel |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.author | Cotrina Navau, Josep |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2014-06-02T12:19:08Z |
dc.date.created | 2005 |
dc.date.issued | 2005 |
dc.identifier.citation | Fernandez, M.; Soriano, M.; Cotrina, J. Tracing traitors by guessing secrets. The q-ary case. A: Information Security Practice and Experience Conference. "Information security practice and experience: First International Conference, ISPEC 2005: Singapore, April 11-14, 2005: proceedings". Singapore: Springer, 2005, p. 61-73. |
dc.identifier.isbn | 978-3-540-25584-0 |
dc.identifier.uri | http://hdl.handle.net/2117/23120 |
dc.description.abstract | In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential traitor tracing schemes are used to detect piracy in multimedia content broadcast systems, where the traitors illegally rebroadcast the content they receive to unauthorized users. |
dc.format.extent | 13 p. |
dc.language.iso | eng |
dc.publisher | Springer |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació |
dc.subject.lcsh | Cryptography |
dc.subject.lcsh | Computer security |
dc.subject.other | Data Encryption |
dc.subject.other | Computer Communication Networks |
dc.subject.other | Operating Systems |
dc.subject.other | Computers and Society |
dc.subject.other | Management of Computing and Information Systems |
dc.subject.other | Information Storage and Retrieval |
dc.title | Tracing traitors by guessing secrets. The q-ary case |
dc.type | Conference report |
dc.subject.lemac | Criptografia |
dc.subject.lemac | Seguretat informàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.contributor.group | Universitat Politècnica de Catalunya. WNG - Grup de xarxes sense fils |
dc.identifier.doi | 10.1007/978-3-540-31979-5_6 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://link.springer.com/chapter/10.1007%2F978-3-540-31979-5_6 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 12942910 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Fernandez, M.; Soriano, M.; Cotrina, J. |
local.citation.contributor | Information Security Practice and Experience Conference |
local.citation.pubplace | Singapore |
local.citation.publicationName | Information security practice and experience: First International Conference, ISPEC 2005: Singapore, April 11-14, 2005: proceedings |
local.citation.startingPage | 61 |
local.citation.endingPage | 73 |