[1]FIAT A,NAOR M.Broadcast encryption[C].Berlin Germany:Advance in Cryptology-CRYPTO93,Springer-Verlag,1994,773:480-491.
[2]CHOR B,FIAT A,NAOR M.Tracing traitors[C].Berlin Germany:Advance in Cryptology-CRYPTO94,Springer-Verlag,1994,839:257-270.
[3]苏加军,刘景美,王新梅.一种改进的叛徒追踪方案[J].西安电子科技大学学报:自然科学版,2005,32(5):786-789.
[4]张学军,王东勇,曾智勇,等.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报:自然科学版,2007,34(2):274-278.
[5]STINSON D R,VAN TRUNG T,WEI R.Secure frameproof codes,key distribution patterns,group testing algorithms and related structures[J].Journal of Statist Planning Inference,2000,7(2):595-617.
[6]BONEH D,SHAW J.Collusion-secure fingerprinting for digital data[J].IEEE Transactions on Information Theory,1998,44(5):1897-1905.
[7]STADDON J N,STINSON D R,RUIZHONG WEI.Combinatorial properties of frameproof and traceability codes [J].IEEE Transactions on Information Theory,2001,47(3):173-177.
[8]TRI V L,MIKE B,HU Jiangyi.Short c-secure fingerprinting codes[J].Berlin Germany:ISC 2003,LNCS 2851,Springer-Verlag,2003:422-427. |