Login / Signup
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Yongdong Wu
Feng Bao
Robert H. Deng
Published in:
ACISP (2007)
Keyphrases
</>
asymptotically optimal
asymptotic optimality
authentication scheme
chosen message
heavy traffic
arrival rate
declustering schemes
additive error
web services