P. Indyk, H. Q. Ngo, and A. Rudra, Efficiently Decodable Non-adaptive Group Testing, Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp.1126-1142, 2010.
DOI : 10.1137/1.9781611973075.91

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.5687

T. D. Nguyen, T. V. Bui, V. H. Dang, and D. Choi, Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, pp.973-978, 2012.
DOI : 10.1109/UIC-ATC.2012.18

P. Meerwald and T. Furon, Group testing meets traitor tracing, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4204-4207
DOI : 10.1109/ICASSP.2011.5947280

URL : https://hal.archives-ouvertes.fr/inria-00580899

M. Alekhnovich, Linear Diophantine equations over polynomials and soft decoding of Reed-Solomon codes, Proceedings . The 43rd Annual IEEE Symposium on, pp.439-448, 2002.

F. Parvaresh and A. Vardy, Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05), 2005.
DOI : 10.1109/SFCS.2005.29

C. Lbbecke and M. Falkenberg, A framework for assessing market entry opportunities for internet-based TV. Inter, J. on Media Management, vol.4, issue.2, pp.95-104, 2002.

Y. Huang, S. Shieh, F. Ho, and J. Wang, Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems, IEEE Transactions on Multimedia, vol.6, issue.5, pp.760-769, 2004.
DOI : 10.1109/TMM.2004.834861

. Macq, M. Benoit, and J. Quisquater, Cryptology for digital TV broadcasting, Proceedings of the IEEE, pp.944-957, 1995.
DOI : 10.1109/5.387094

C. Kim, Y. Hwang, and P. Lee, Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels, Information Security Applications, pp.264-277, 2005.
DOI : 10.1007/978-3-540-31815-6_22

S. Hou, T. Uehara, T. Satoh, Y. Morimura, and M. Minoh, Fingerprinting codes for Internet-based live pay-TV system using balanced incomplete block designs. IE- ICE transactions on information and systems 92, pp.876-887, 2009.

B. Chor, A. Fiat, and M. Naor, Tracing traitors, Advances in Cryptolo- gyCRYPTO94, pp.257-270, 1994.

D. Boneh and M. Franklin, An Efficient Public Key Traitor Tracing Scheme, Advances in CryptologyCRYPTO99, pp.783-783, 1999.
DOI : 10.1007/3-540-48405-1_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.7422

P. Elias, List decoding for noisy channels. Massachusetts Institute of Technology, 1957.

V. Guruswami, List decoding of error-correcting codes: winning thesis of the, ACM doctoral dissertation competition, vol.3282, 2002.
DOI : 10.1007/b104335

A. Silverberg, J. Staddon, and J. Walker, Efficient Traitor Tracing Algorithms Using List Decoding, Advances in CryptologyASIACRYPT, pp.175-192, 2001.
DOI : 10.1007/3-540-45682-1_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.2327

W. H. Kautz and R. C. Singleton, Nonrandom binary superimposed codes, IEEE Transactions on Information Theory, vol.10, issue.4, pp.363-377, 1964.
DOI : 10.1109/TIT.1964.1053689

D. Du and F. Hwang, Combinatorial group testing and its applications, 1993.
DOI : 10.1142/9789812798183

R. Dorfman, The Detection of Defective Members of Large Populations, The Annals of Mathematical Statistics, vol.14, issue.4, pp.436-440, 1943.
DOI : 10.1214/aoms/1177731363

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.
DOI : 10.1137/0108018

S. B. Wicker and V. K. Bhargava, Reed-Solomon codes and their applications, 1999.
DOI : 10.1109/9780470546345

M. Goodrich, M. Atallah, and R. Tamassia, Indexing Information for Data Forensics, Applied Cryptography and Network Security, 2005.
DOI : 10.1007/11496137_15

G. Cormode and S. Muthukrishnan, What's hot and what's not, Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '03, pp.296-306, 2003.
DOI : 10.1145/773153.773182

H. Q. Ngo and D. Z. Du, A survey on combinatorial group testing algorithms with applications to DNA library screening. Discrete mathematical problems with medical applications, pp.171-182, 2000.