Traitor

Results: 49



#Item
11

Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg1? , Jessica Staddon2?? , and Judy L. Walker3? ? ? 1 Department of Mathematics

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-12-12 19:25:24
    12

    Issue #85 • Dec. 29, 2011 “The Death of Roach,” by Spencer Ellsworth “The Traitor Baru Cormorant, Her Field-General, and Their Wounds,” by Seth Dickinson For more stories and Audio Fiction Podcasts, visit http:

    Add to Reading List

    Source URL: www.beneath-ceaseless-skies.com

    - Date: 2012-01-02 13:52:38
      13License / Computer law / Software licenses / Law / Business / Vehicle registration plate / Traitor tracing / Strategic management / Free software licenses / Business law

      Order Form Single-User and Multi-User Licenses Please complete this form and return with payment to the address at the bottom of the page. To purchase with a credit card, please visit www.handygraph.com. 1. Quantity and

      Add to Reading List

      Source URL: www.handygraph.com

      Language: English - Date: 2009-06-03 13:42:06
      14Software licenses / Installation software / Computer virus / Product activation / Installation / Windows XP / Microsoft Windows / Traitor tracing / System software / Software / Antivirus software

      RJS VERIFIER COMPUTER INTERFACE REPORT (VCIR) SETUP Applies to Part NumberNOTE: Some anti-virus software programs will identify our software licensing program as a potential virus. You may need to add an except

      Add to Reading List

      Source URL: www.rjs1.com

      Language: English - Date: 2012-12-14 14:56:13
      15Free software / Software / Law / Internet privacy / Computing / Traitor tracing / Microsoft Product Activation / Software licenses / Product activation / Software development process

      Software Activation Explained What is software activation? Obtaining the consent of users Software activation is a method some software

      Add to Reading List

      Source URL: www.siprofessionals.org

      Language: English - Date: 2009-07-07 13:00:12
      16Formal languages / Mathematics / Longest common substring problem / Substring / Linguistics / Orbifold / Comparison of programming languages / Combinatorics / String / Dynamic programming

      Traitor-Tracing on Binary Strings Michael J. Collins Sandia National Laboratories⋆ Albuquerque, NM USA 87185

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-12-23 13:49:52
      17Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

      Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2006-12-04 09:17:42
      18Computer law / Installation software / Law / Proprietary software / Shareware / Installation / Traitor tracing / MediaMax CD-3 / Software licenses / System software / Software

      PSListener Help ManualPeer Software Inc. All Rights Reserved. Updated Wednesday, February 25, 2015 2

      Add to Reading List

      Source URL: www.peersoftware.com

      Language: English - Date: 2015-02-25 22:17:29
      19Politics of Australia / Australia / Asio / Manning Clark / Whitlam Government / Director-General of Security / Petrov Affair / Michael Thwaites / Government of Australia / Australian intelligence agencies / Australian Security Intelligence Organisation

      HONEST HISTORY SERIES IS DAVID HORNER’S OFFICIAL HISTORY OF ASIO ‘HONEST HISTORY’? WAS COLONEL SPRY A TRAITOR? ERNST WILLHEIM

      Add to Reading List

      Source URL: manningclarkhouse.files.wordpress.com

      Language: English - Date: 2015-04-08 20:38:37
      20Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

      On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

      Add to Reading List

      Source URL: www.nik.no

      Language: English - Date: 2005-12-08 10:13:37
      UPDATE