2010 International Symposium on Intelligence Information Processing and Trusted Computing 2010
DOI: 10.1109/iptc.2010.101
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting for Copyright Protection in P2P Context

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Key management is discussed in [20], [26]. And a fingerprint based scheme is proposed in [14]. With regard to other properties, availability, file authenticity, and anonymity are extensively studied in the literature.…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Key management is discussed in [20], [26]. And a fingerprint based scheme is proposed in [14]. With regard to other properties, availability, file authenticity, and anonymity are extensively studied in the literature.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…3.1, I encrypts piece ′ j and sends a 3-tuple of data, (X 1 , X 2 , X 3 ), to a user, A. After a user, B, gets all of the encrypted pieces, B obtains a set of the decryption keys, K B , and the decryption key in the scheme of [14] from the KM server. By the decryption with K B , B gets piece ′ 1 , .…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 3 more Smart Citations