Traitor Tracing for Shortened and Corrupted Fingerprints

Reihaneh Safavi-Naini, Yejing Wang. Traitor Tracing for Shortened and Corrupted Fingerprints. In Joan Feigenbaum, editor, Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers. Volume 2696 of Lecture Notes in Computer Science, pages 81-100, Springer, 2002. [doi]

@inproceedings{Safavi-NainiW02,
  title = {Traitor Tracing for Shortened and Corrupted Fingerprints},
  author = {Reihaneh Safavi-Naini and Yejing Wang},
  year = {2002},
  url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=81},
  researchr = {https://researchr.org/publication/Safavi-NainiW02},
  cites = {0},
  citedby = {0},
  pages = {81-100},
  booktitle = {Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  editor = {Joan Feigenbaum},
  volume = {2696},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-40410-4},
}