Fingerprinting, 1983 IEEE Symposium on Security and Privacy, pp.18-22, 1983. ,
DOI : 10.1109/SP.1983.10018
Fingerprinting Long Forgiving Messages, Advances in Cryptology CRYPTO 85 Proceedings, pp.180-189, 1985. ,
DOI : 10.1007/3-540-39799-X_15
Optimal probabilistic fingerprint codes, J. ACM, vol.55, issue.2 10, p.11024, 2008. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
DOI : 10.1109/18.705568
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638
Lower bounds for collusion-secure fingerprinting, Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, pp.472-479, 2003. ,
Improved versions of Tardos??? fingerprinting scheme, Designs, Codes and Cryptography, pp.79-103, 2008. ,
DOI : 10.1007/s10623-008-9200-z
Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3663-3676, 2008. ,
DOI : 10.1109/TIT.2008.926307
URL : http://arxiv.org/abs/cs/0607131
An Improvement of Tardos???s Collusion-Secure Fingerprinting Codes with Very Short Lengths, Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes, ser. AAECC'07, p.8089, 2007. ,
DOI : 10.1007/978-3-540-77224-8_12
On the systematic generation of tardos's fingerprinting codes, 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp.748-753, 2008. ,
Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008. ,
DOI : 10.1109/ISIT.2008.4594980
URL : http://arxiv.org/abs/0801.3837
High rate fingerprinting codes and the fingerprinting capacity, Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, ser. SODA '09, p.336345, 2009. ,
DOI : 10.1137/1.9781611973068.38
Towards Joint Tardos Decoding: The ???Don Quixote??? Algorithm, Information Hiding, pp.28-42, 2011. ,
DOI : 10.1007/978-3-642-24178-9_3
URL : https://hal.archives-ouvertes.fr/hal-01057832
EM decoding of tardos traitor tracing codes, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.99-106, 2009. ,
DOI : 10.1145/1597817.1597835
URL : https://hal.archives-ouvertes.fr/inria-00505875
Symmetric tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.46, p.137166, 2008. ,
A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain, Proceedings IEEE International Conference on Communications ICC '95, pp.1009-1013, 1995. ,
DOI : 10.1109/ICC.1995.524253
Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009. ,
DOI : 10.1109/WIFS.2009.5386484
URL : https://hal.archives-ouvertes.fr/inria-00505893