Skip to main content

and
  1. Chapter and Conference Paper

    Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack

    In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or content decrypting key are found, a traitor tracing scheme could identify at le...

    Hongxia **, Jeffery Lotspiech in Computer Security – ESORICS 2007 (2007)

  2. No Access

    Chapter and Conference Paper

    Practical Forensic Analysis in Advanced Access Content System

    In this paper we focus on the use of a traitor tracing scheme for distribution models that are one-to-many. It can be a networked broadcast system; It can be based on prerecorded or recordable physical media. ...

    Hongxia **, Jeffery Lotspiech in Information Security Practice and Experience (2006)

  3. Chapter and Conference Paper

    Flexible Traitor Tracing for Anonymous Attacks

    Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to iden...

    Hongxia **, Jeffery Lotspiech in Communications and Multimedia Security (2005)

  4. No Access

    Chapter and Conference Paper

    Towards Better Software Tamper Resistance

    Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tam...

    Hongxia **, Ginger Myles, Jeffery Lotspiech in Information Security (2005)