M. Cheraghchi, A. Hormati, A. Karbasi, and M. Vetterli, Group Testing With Probabilistic Tests: Theory, Design and Application, Proc. 47th Allerton Conf. on Commun., Control and Computing, 2009.
DOI : 10.1109/TIT.2011.2148691

URL : http://arxiv.org/abs/1009.3186

G. Atia and V. Saligrama, Boolean Compressed Sensing and Noisy Group Testing, IEEE Transactions on Information Theory, vol.58, issue.3, 2009.
DOI : 10.1109/TIT.2011.2178156

URL : http://arxiv.org/abs/0907.1061

D. Sejdinovic and O. Johnson, Note on noisy group testing: Asymptotic bounds and belief propagation reconstruction, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2010.
DOI : 10.1109/ALLERTON.2010.5707018

URL : http://arxiv.org/abs/1010.2441

P. Moulin, Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008.
DOI : 10.1109/ISIT.2008.4594980

URL : http://arxiv.org/abs/0801.3837

G. Tardos, Optimal probabilistic fingerprint codes, Proc. 35th ACM Symposium on Theory of Computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

T. Furon, L. Pérez-freire, A. Guyader, and F. Cérou, Estimating the Minimal Length of Tardos Code, Proc. 11th Information Hiding Workshop, pp.176-190, 2009.
DOI : 10.1007/s10623-007-9142-x

URL : https://hal.archives-ouvertes.fr/inria-00505882

T. Furon and L. Pérez-freire, Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009.
DOI : 10.1109/WIFS.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893