“On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
tifs06security.pdf (563.51 KB)
, 
“Blind decoder for binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, “EM decoding of Tardos traitor tracing codes”, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
,