共 55 条
[1]
Adelsbach A., Huber U., Sadeghi A.-R., Fingercasting - Joint fingerprinting and decryption of broadcast messages, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4058, pp. 136-147, (2006)
[2]
Akashi N., Et al., Hierarchical construction of tardos code, Proceedings of the 2008 International Symposium on Information Theory and its Applications, pp. 1-6, (2008)
[3]
Anderson R., Manifavas C., Chameleon - A New Kind of Stream Cipher, Lecture Notes in Computer Science, 1267, pp. 107-113, (1997)
[4]
Bao F., Multimedia content protection by cryptography and watermarking in tamper-resistant hardware, Proceedings of the 2000 ACM Workshops on Multimedia, pp. 139-142, (2000)
[5]
Barg A., Blakley G.R., Kabatiansky G., Digital fingerprinting codes: Problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, 49, 4, pp. 852-865, (2003)
[6]
Blakley G., Meadows C., Purdy G., Fingerprinting long forgiving messages, Proceedings of the 1985 Crypto, pp. 180-189, (1985)
[7]
Blayer O., Tassa T., Improved versions of tardos' fingerprinting scheme, Designs, Codes and Cryptography, 48, 1, pp. 79-103, (2008)
[8]
Boneh D., Shaw J., Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, 44, 5, pp. 1897-1905, (1998)
[9]
Briscoe B., Fairman I., Nark: Receiver based multicast key management and non-repudiation, British Telecom Technical Report, (1999)
[10]
Brown I., Perkins C., Crowcroft J., Watercasting: Distributed watermarking of multicast media, Proceedings of the 1999 International COST264 Workshop on Networked Group Communication, pp. 286-300, (1999)