Author of the publication

Traitor Tracing Against Powerful Attacks Using Combinatorial Designs.

, , and . AAECC, volume 3857 of Lecture Notes in Computer Science, page 215-224. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planar difference functions., , and . ISIT, page 1082-1086. IEEE, (2012)A family of two-weight irreducible cyclic codes., and . IEEE Trans. Inf. Theory, 56 (6): 2568-2570 (2010)Traitor Tracing Against Powerful Attacks Using Combinatorial Designs., , and . AAECC, volume 3857 of Lecture Notes in Computer Science, page 215-224. Springer, (2006)The spread of ideas in a weighted threshold network., , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 437-447. Springer, (2016)Online election campaigning: Identifying political parties using likes and comments., , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 619-630. Springer, (2016)Honeyboost: Boosting honeypot performance with data fusion and anomaly detection., , and . CoRR, (2021)Cell Tour: Learning About the Cellular Membrane Using Virtual Reality., , , , , and . FIE, page 1-5. IEEE, (2023)New linear codes over Zps via the trace map., and . ISIT, page 124-126. IEEE, (2005)Using shortest path to discover criminal community., , and . Digital Investigation, (2015)Fourier Transforms from a Weighted Trace Map., and . ISIT, page 1080-1084. IEEE, (2006)