G. Tardos, Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

B. Skoric, T. Vladimirova, M. Celik, and J. Talstra, Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, 2006.
DOI : 10.1109/TIT.2008.926307

URL : http://arxiv.org/abs/cs/0607131

K. Nuida, M. Hagiwara, H. Watanabe, and H. Imai, Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, 2006.

S. Katzenbeisser, B. Skoric, M. Celik, and A. R. Sadeghi, Combining Tardos Fingerprinting Codes and Fingercasting, Proc. of 9th Information Hiding, 2007.
DOI : 10.1007/11922841_35

A. Barg, G. R. Blakley, and G. A. Kabatiansky, Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003.
DOI : 10.1109/TIT.2003.809570

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

R. Safavi-naini and Y. Wang, Collusion Secure q-ary Fingerprinting for Perceptual Content, Proc. Security and Privacy in Digital Rights Management , SPDRM'01, pp.57-75, 2001.
DOI : 10.1007/3-540-47870-1_5