Flexible traitor tracing for anonymous attacks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently water-marked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Jin, H., & Lotspiech, J. (2005). Flexible traitor tracing for anonymous attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3677 LNCS, pp. 269–270). https://doi.org/10.1007/11552055_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free