Skip to search formSkip to main contentSkip to account menu

Traitor tracing

Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the… 
2010
2010
The development explained in this article proves that is possible to trace dishonest users who upload videos with sensitive… 
2008
2008
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first describe scrambling for raw audio… 
2007
2007
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or… 
2006
2006
Today, with the rapid advance in broadband technology, digital contents delivery applications have been used widely and the… 
2004
2004
In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or… 
2004
2004
To protect intellectual property and distribution rights against dishonest customers in the multimedia content market… 
2003
2003
In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude… 
Review
2003
Review
2003
Traitor tracing schemes were designed for use in a broadcast/network environment where piracy is a major problem. Legitimate… 
2000
2000
An efficient traitor tracing scheme for broadcast encryption is proposed. Its security depends on the difficulty of discrete…