Author of the publication

Identification of traitors in algebraic-geometric traceability codes.

, and . IEEE Trans. Signal Process., 52 (10): 3073-3077 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes., and . Inscrypt, volume 4318 of Lecture Notes in Computer Science, page 289-303. Springer, (2006)Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information., , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 231-243. Springer, (2005)Almost separating and almost secure frameproof codes., , and . ISIT, page 2696-2700. IEEE, (2011)Identification of traitors in algebraic-geometric traceability codes., and . IEEE Trans. Signal Process., 52 (10): 3073-3077 (2004)Identifying Traitors Using the Koetter-Vardy Algorithm., , and . IEEE Trans. Inf. Theory, 57 (2): 692-704 (2011)New Considerations about the Correct Design of Turbo Fingerprinting Codes., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 501-516. Springer, (2008)Bounds and Constructions of Parent Identifying Schemes via the Algorithmic Version of the Lovász Local Lemma., , and . IEEE Trans. Inf. Theory, 69 (11): 7049-7069 (November 2023)A Study of the Separating Property in Reed-Solomon Codes by Bounding the Minimum Distance., and . CoRR, (2021)Traitor tracing over YouTube video service - proof of concept., , and . Telecommun. Syst., 45 (1): 47-60 (2010)Codes for Exact Support Recovery of Sparse Vectors from Inaccurate Linear Measurements and Their Decoding., , , and . Probl. Inf. Transm., 59 (1): 14-21 (January 2023)