Login / Signup

Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.

Yongdong WuFeng BaoRobert H. Deng
Published in: ACISP (2007)
Keyphrases
  • asymptotically optimal
  • asymptotic optimality
  • authentication scheme
  • chosen message
  • heavy traffic
  • arrival rate
  • declustering schemes
  • additive error
  • web services