Sign in

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.

Kazuto OgawaGoichiro HanaokaHideki Imai
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2017)
Keyphrases