Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Endogenous Panophthalmitis : The Traitor Within !

Aim: To report a rare case of endogenous panophthalmitis in a diabetic with chronic kidney disease undergoing haemodialysis. Methods: A 54 year old male diabetic and hypertensive with chronic kidney disease (CKD) on maintenance haemodialysis through a tunnelled internal jugular vein (IJV) catheter with IJV catheter infection was being treated with parenteral Imipenam. He complained of sudden pa...

متن کامل

Randomised Dynamic Traitor Tracing

Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...

متن کامل

Threshold Traitor Tracing

This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a nonnegligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of ke...

متن کامل

Traitor Traceable Signature Scheme

The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2006

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2006.885023