Traitor Tracing Against Powerful Attacks Using Combinatorial Designs

Simon McNicol, Serdar Boztas, Asha Rao. Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. In Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings. Volume 3857 of Lecture Notes in Computer Science, pages 215-224, Springer, 2006. [doi]

@inproceedings{McNicolBR06,
  title = {Traitor Tracing Against Powerful Attacks Using Combinatorial Designs},
  author = {Simon McNicol and Serdar Boztas and Asha Rao},
  year = {2006},
  doi = {10.1007/11617983_21},
  url = {http://dx.doi.org/10.1007/11617983_21},
  researchr = {https://researchr.org/publication/McNicolBR06},
  cites = {0},
  citedby = {0},
  pages = {215-224},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings},
  editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli},
  volume = {3857},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-31423-7},
}