Author of the publication

Applications of list decoding to tracing traitors.

, , and . IEEE Trans. Information Theory, 49 (5): 1312-1318 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web-Based Inference Detection., , and . USENIX Security Symposium, USENIX Association, (2007)Public vs. Publicized: Content Use Trends and Privacy Expectations., and . HotSec, USENIX Association, (2011)Dynamic inference control.. DMKD, page 94-100. ACM, (2003)Secret Handshakes from Pairing-Based Key Agreements., , , , , and . IEEE Symposium on Security and Privacy, page 180-196. IEEE Computer Society, (2003)The Web as a Privacy Lab., , , and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)The Rules of Redaction: Identify, Protect, Review (and Repeat)., , , , and . IEEE Security & Privacy, 7 (6): 46-53 (2009)Applications of list decoding to tracing traitors., , and . IEEE Trans. Information Theory, 49 (5): 1312-1318 (2003)Randomness Re-use in Multi-recipient Encryption Schemeas., , and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 85-99. Springer, (2003)Secure Conjunctive Keyword Search over Encrypted Data., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 31-45. Springer, (2004)Efficient Methods for Integrating Traceability and Broadcast Encryption., , and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 372-387. Springer, (1999)