From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Traitors Using the Koetter-Vardy Algorithm., , и . IEEE Trans. Inf. Theory, 57 (2): 692-704 (2011)Identification of traitors in algebraic-geometric traceability codes., и . IEEE Trans. Signal Process., 52 (10): 3073-3077 (2004)Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information., , и . IWDW, том 3710 из Lecture Notes in Computer Science, стр. 231-243. Springer, (2005)New Considerations about the Correct Design of Turbo Fingerprinting Codes., , и . ESORICS, том 5283 из Lecture Notes in Computer Science, стр. 501-516. Springer, (2008)Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes., и . Inscrypt, том 4318 из Lecture Notes in Computer Science, стр. 289-303. Springer, (2006)Almost separating and almost secure frameproof codes., , и . ISIT, стр. 2696-2700. IEEE, (2011)Bounds and Constructions of Parent Identifying Schemes via the Algorithmic Version of the Lovász Local Lemma., , и . IEEE Trans. Inf. Theory, 69 (11): 7049-7069 (ноября 2023)A Study of the Separating Property in Reed-Solomon Codes by Bounding the Minimum Distance., и . CoRR, (2021)Traitor tracing over YouTube video service - proof of concept., , и . Telecommun. Syst., 45 (1): 47-60 (2010)Codes for Exact Support Recovery of Sparse Vectors from Inaccurate Linear Measurements and Their Decoding., , , и . Probl. Inf. Transm., 59 (1): 14-21 (января 2023)