Revocation and Tracing Schemes for Stateless Receivers
- 2 August 2001
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Broadcast EncryptionPublished by Springer Nature ,2001
- Tracing traitorsIEEE Transactions on Information Theory, 2000
- Dynamic Traitor TracingLecture Notes in Computer Science, 1999
- Secure Integration of Asymmetric and Symmetric Encryption SchemesLecture Notes in Computer Science, 1999
- An Efficient Public Key Traitor Tracing SchemeLecture Notes in Computer Science, 1999
- Efficient Communication-Storage Tradeoffs for Multicast EncryptionLecture Notes in Computer Science, 1999
- Multicast security: a taxonomy and some efficient constructionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- A Quick Group Key Distribution Scheme with “Entity Revocation”Lecture Notes in Computer Science, 1999
- Collusion-secure fingerprinting for digital dataIEEE Transactions on Information Theory, 1998
- Tracing TraitorsLecture Notes in Computer Science, 1994