SCOTT: set cover tracing technology
Abstract
References
Index Terms
- SCOTT: set cover tracing technology
Recommendations
The privacy of tracing traitors
DRM '10: Proceedings of the tenth annual ACM workshop on Digital rights managementIn this talk I will explore a connection between traitor tracing schemes and the problem of sanitizing data to remove personal information while allowing statistically meaningful information to be released. It is based on joint work with Cynthia Dwork, ...
Efficient Trace and Revoke Schemes
FC '00: Proceedings of the 4th International Conference on Financial CryptographyOur goal is to design encryption schemes for mass distribution of data in which it is possible to (1) deter users from leaking their personal keys, (2) trace which users leaked keys to construct an illegal decryption device, and (3) revoke these keys as ...
A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 5This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Alberto del Bimbo,
- Shih-Fu Chang,
- Program Chair:
- Arnold Smeulders
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigmm
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 136Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in