Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pirate Evolution: How to Make the Most of Your Traitor Keys., and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 448-465. Springer, (2007)Improving the Round Complexity of Traitor Tracing Schemes., and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 273-290. (2010)Tracing and Revoking Pirate Rebroadcasts., and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 253-271. (2009)Traitor Tracing without A Priori Bound on the Coalition Size., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 234-241. Springer, (2009)Generic Construction of Trace and Revoke Schemes., , , and . IACR Cryptology ePrint Archive, (2012)An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking.. IH&MMSec, page 35-44. ACM, (2013)On the security of a public-key traitor tracing scheme with sublinear ciphertext size., and . Digital Rights Management Workshop, page 1-10. ACM, (2009)Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders., and . ISC, volume 7001 of Lecture Notes in Computer Science, page 17-31. Springer, (2011)