Amanote Research

Amanote Research

    RegisterSign In

Flexible Traitor Tracing for Anonymous Attacks

Lecture Notes in Computer Science - Germany
doi 10.1007/11552055_29
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2005

Authors
Hongxia JinJeffery Lotspiech
Publisher

Springer Berlin Heidelberg


Related search

Optimal Symmetric Tardos Traitor Tracing Schemes

Designs, Codes, and Cryptography
CombinatoricsApplied MathematicsComputer Science ApplicationsTheoretical Computer ScienceDiscrete Mathematics
2012English

A Public-Key Traitor Tracing Scheme With Revocation Using Dynamic Shares

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

Generic Construction of Hybrid Public Key Traitor Tracing With Full-Public-Traceability

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Tracing Attacks and Restoring Integrity With Lascar

English

An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

ITM Web of Conferences
2017English

Becoming a Traitor

Life Writing
LiteratureLiterary Theory
2019English

Efficient Attributes for Anonymous Credentials

2008English

Transforming Haskell for Tracing

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

Anonymous Review for Amt-2019-409

2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy