Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
Hyun-Jeong KimDong Hoon LeeMoti YungPublished in: ACISP (2002)
Keyphrases
- privacy preservation
- privacy issues
- protection mechanisms
- privacy preserving
- privacy preserving data mining
- data protection
- personal information
- access control
- disclosure control
- sensitive information
- differential privacy
- private information
- sensitive data
- privacy aware
- data mining
- data security
- personal data
- data privacy
- privacy concerns
- privacy protection
- statistical databases
- inference control
- data publishing
- security issues
- digital watermarking
- fine grained
- legal issues
- confidential data
- data lineage
- ring signature scheme
- privacy requirements
- private data
- authentication protocol
- social networking
- information security
- third party
- information systems