Worst case attacks against binary probabilistic traitor tracing codes
Teddy FuronLuis Pérez-FreirePublished in: CoRR (2009)
Keyphrases
- worst case
- average case
- logical operations
- probabilistic model
- upper bound
- lower bound
- error correcting codes
- error correcting
- bayesian networks
- countermeasures
- np hard
- generative model
- uncertain data
- error correction
- approximation algorithms
- traffic analysis
- watermarking scheme
- greedy algorithm
- probability theory
- error bounds
- information theoretic
- belief networks
- posterior probability
- security protocols
- intrusion detection
- security risks
- continuous valued
- computational complexity