Efficiently Decodable Non-adaptive Group Testing, Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp.1126-1142, 2010. ,
DOI : 10.1137/1.9781611973075.91
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.5687
Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, pp.973-978, 2012. ,
DOI : 10.1109/UIC-ATC.2012.18
Group testing meets traitor tracing, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4204-4207 ,
DOI : 10.1109/ICASSP.2011.5947280
URL : https://hal.archives-ouvertes.fr/inria-00580899
Linear Diophantine equations over polynomials and soft decoding of Reed-Solomon codes, Proceedings . The 43rd Annual IEEE Symposium on, pp.439-448, 2002. ,
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05), 2005. ,
DOI : 10.1109/SFCS.2005.29
A framework for assessing market entry opportunities for internet-based TV. Inter, J. on Media Management, vol.4, issue.2, pp.95-104, 2002. ,
Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems, IEEE Transactions on Multimedia, vol.6, issue.5, pp.760-769, 2004. ,
DOI : 10.1109/TMM.2004.834861
Cryptology for digital TV broadcasting, Proceedings of the IEEE, pp.944-957, 1995. ,
DOI : 10.1109/5.387094
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels, Information Security Applications, pp.264-277, 2005. ,
DOI : 10.1007/978-3-540-31815-6_22
Fingerprinting codes for Internet-based live pay-TV system using balanced incomplete block designs. IE- ICE transactions on information and systems 92, pp.876-887, 2009. ,
Tracing traitors, Advances in Cryptolo- gyCRYPTO94, pp.257-270, 1994. ,
An Efficient Public Key Traitor Tracing Scheme, Advances in CryptologyCRYPTO99, pp.783-783, 1999. ,
DOI : 10.1007/3-540-48405-1_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.7422
List decoding for noisy channels. Massachusetts Institute of Technology, 1957. ,
List decoding of error-correcting codes: winning thesis of the, ACM doctoral dissertation competition, vol.3282, 2002. ,
DOI : 10.1007/b104335
Efficient Traitor Tracing Algorithms Using List Decoding, Advances in CryptologyASIACRYPT, pp.175-192, 2001. ,
DOI : 10.1007/3-540-45682-1_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.2327
Nonrandom binary superimposed codes, IEEE Transactions on Information Theory, vol.10, issue.4, pp.363-377, 1964. ,
DOI : 10.1109/TIT.1964.1053689
Combinatorial group testing and its applications, 1993. ,
DOI : 10.1142/9789812798183
The Detection of Defective Members of Large Populations, The Annals of Mathematical Statistics, vol.14, issue.4, pp.436-440, 1943. ,
DOI : 10.1214/aoms/1177731363
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960. ,
DOI : 10.1137/0108018
Reed-Solomon codes and their applications, 1999. ,
DOI : 10.1109/9780470546345
Indexing Information for Data Forensics, Applied Cryptography and Network Security, 2005. ,
DOI : 10.1007/11496137_15
What's hot and what's not, Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '03, pp.296-306, 2003. ,
DOI : 10.1145/773153.773182
A survey on combinatorial group testing algorithms with applications to DNA library screening. Discrete mathematical problems with medical applications, pp.171-182, 2000. ,