Login / Signup

New Traitor Tracing Scheme against Anonymous Attack.

Chen YangWenping MaXinmei Wang
Published in: ICICIC (1) (2006)
Keyphrases
  • digital signature scheme
  • detection scheme
  • payment scheme
  • peer to peer
  • data sets
  • neural network
  • data mining
  • anomaly detection
  • countermeasures
  • detection mechanism