E. Abbe and L. Zheng, Linear Universal Decoding for Compound Channels, IEEE Transactions on Information Theory, vol.56, issue.12, pp.5999-6013, 2010.
DOI : 10.1109/TIT.2010.2080910

S. Boucheron, G. Lugosi, and P. Massart, Concentration Inequalities: A Nonasymptotic Theory of Independence, 2013.
DOI : 10.1093/acprof:oso/9780199535255.001.0001

URL : https://hal.archives-ouvertes.fr/hal-00794821

F. Cérou, T. Furon, and A. Guyader, Experimental assessment of the reliability for watermarking and fingerprinting schemes, EURASIP Jounal on Information Security, p.12, 2008.

M. Desoubeaux, C. Herzet, W. Puech, and G. L. Guelvouit, Enhanced blind decoding of tardos codes with new MAP-based functions, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), 2011.
DOI : 10.1109/MMSP.2013.6659302

URL : https://hal.archives-ouvertes.fr/hal-00907670

T. Furon, A. Guyader, and F. Cérou, On the design and optimisation of tardos probabilistic fingerprinting codes, Proc. of the 10th Information Hiding Workshop, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00504549

T. Furon and L. Perez-freire, Worst case attacks against binary probabilistic traitor tracing codes. Rejected by IEEE Trans. on Information Forensics and Security, 2009.
DOI : 10.1109/wifs.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893

A. Guyader, N. Hengartner, and E. Matzner-løber, Simulation and Estimation of Extreme Quantiles and Extreme Probabilities, Applied Mathematics & Optimization, vol.22, issue.4, pp.1-26, 2011.
DOI : 10.1007/s00245-011-9135-z

URL : https://hal.archives-ouvertes.fr/hal-00911891

M. Kearns and L. Saul, Large deviation methods for approximate probabilistic inference, Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, UAI'98, pp.311-319, 1998.

T. Laarhoven, Capacities and capacity-achieving decoders for various fingerprinting games, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, IH&MMSec '14, 2014.
DOI : 10.1145/2600918.2600925

URL : http://arxiv.org/abs/1401.5688

P. Meerwald, T. Furon, J. Oosterwijk, B. Skori´cskori´c, and J. Doumen, Towards practical joint decoding of binary tardos fingerprinting codes Information Forensics and Security A capacity-achieving simple decoder for bias-based traitor tracing schemes, IEEE Transactions on Cryptology ePrint Archive, issue.99, 2013.

A. Simone, T. U. Eindhoven14-]-b, S. Skori´cskori´c, M. Katzenbeisser, and . Celik, Error probabilities in Tardos codes Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography, Skori´cSkori´c and J.-J. Oosterwijk. Binary and q-ary Tardos codes, pp.137-166, 2008.

G. Tardos, Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911