Export 3 results:
[ Author
Filters: First Letter Of Last Name is F and Author is Teddy Furon [Clear All Filters]
“Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “EM decoding of Tardos traitor tracing codes”, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
,