![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Efficient Coalition Detection in Traitor Tracing
In this paper we study the traitor tracing problem for re-broadcasting attack. In this attack, instead of building a pirate clone device (or program) based on their secret keys and sell the clone, the attacker...
-
Chapter and Conference Paper
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or content decrypting key are found, a traitor tracing scheme could identify at le...
-
Chapter and Conference Paper
Practical Forensic Analysis in Advanced Access Content System
In this paper we focus on the use of a traitor tracing scheme for distribution models that are one-to-many. It can be a networked broadcast system; It can be based on prerecorded or recordable physical media. ...
-
Chapter and Conference Paper
Flexible Traitor Tracing for Anonymous Attacks
Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to iden...
-
Chapter and Conference Paper
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tam...
-
Chapter and Conference Paper
Proactive Software Tampering Detection
With the advent of digital technologies, digital content piracy has become a growing concern. Unauthorized music and movie copying are eating a big bite of the profit of the record industry and the movie studi...