Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization
نویسندگان
چکیده
منابع مشابه
Endogenous Panophthalmitis : The Traitor Within !
Aim: To report a rare case of endogenous panophthalmitis in a diabetic with chronic kidney disease undergoing haemodialysis. Methods: A 54 year old male diabetic and hypertensive with chronic kidney disease (CKD) on maintenance haemodialysis through a tunnelled internal jugular vein (IJV) catheter with IJV catheter infection was being treated with parenteral Imipenam. He complained of sudden pa...
متن کاملRandomised Dynamic Traitor Tracing
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...
متن کاملThreshold Traitor Tracing
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a nonnegligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of ke...
متن کاملTraitor Traceable Signature Scheme
The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2006
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2006.885023