Old Web
English
Sign In
Acemap
>
Paper
>
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
2017
Kazuto Ogawa
Goichiro Hanaoka
Hideki Imai
Keywords:
Theoretical computer science
Mathematics
Traitor tracing
Digital watermarking
Computer security
Encoding (memory)
Correction
Source
Cite
Save
Machine Reading By IdeaReader
44
References
1
Citations
NaN
KQI
[]