N. Wagner, Fingerprinting, 1983 IEEE Symposium on Security and Privacy, pp.18-22, 1983.
DOI : 10.1109/SP.1983.10018

G. R. Blakley, C. Meadows, and G. B. Purdy, Fingerprinting Long Forgiving Messages, Advances in Cryptology CRYPTO 85 Proceedings, pp.180-189, 1985.
DOI : 10.1007/3-540-39799-X_15

G. Tardos, Optimal probabilistic fingerprint codes, J. ACM, vol.55, issue.2 10, p.11024, 2008.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638

C. Peikert, A. Shelat, and A. Smith, Lower bounds for collusion-secure fingerprinting, Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, pp.472-479, 2003.

O. Blayer and T. Tassa, Improved versions of Tardos??? fingerprinting scheme, Designs, Codes and Cryptography, pp.79-103, 2008.
DOI : 10.1007/s10623-008-9200-z

B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3663-3676, 2008.
DOI : 10.1109/TIT.2008.926307

URL : http://arxiv.org/abs/cs/0607131

K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe et al., An Improvement of Tardos???s Collusion-Secure Fingerprinting Codes with Very Short Lengths, Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes, ser. AAECC'07, p.8089, 2007.
DOI : 10.1007/978-3-540-77224-8_12

M. Kuribayashi, N. Akashi, and M. Morii, On the systematic generation of tardos's fingerprinting codes, 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp.748-753, 2008.

P. Moulin, Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008.
DOI : 10.1109/ISIT.2008.4594980

URL : http://arxiv.org/abs/0801.3837

E. Amiri and G. Tardos, High rate fingerprinting codes and the fingerprinting capacity, Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, ser. SODA '09, p.336345, 2009.
DOI : 10.1137/1.9781611973068.38

P. Meerwald and T. Furon, Towards Joint Tardos Decoding: The ???Don Quixote??? Algorithm, Information Hiding, pp.28-42, 2011.
DOI : 10.1007/978-3-642-24178-9_3

URL : https://hal.archives-ouvertes.fr/hal-01057832

T. Furon and L. Perez-freire, EM decoding of tardos traitor tracing codes, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.99-106, 2009.
DOI : 10.1145/1597817.1597835

URL : https://hal.archives-ouvertes.fr/inria-00505875

B. Skoric, S. Katzenbeisser, and M. U. Celik, Symmetric tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.46, p.137166, 2008.

P. Robertson, E. Villebrun, and P. Hoeher, A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain, Proceedings IEEE International Conference on Communications ICC '95, pp.1009-1013, 1995.
DOI : 10.1109/ICC.1995.524253

T. Furon and L. Perez-freire, Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009.
DOI : 10.1109/WIFS.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893