@inproceedings{67166c32fbb2445f97997766a71308cf,
title = "Tracing traitors",
abstract = "We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. This is particularly important for broadcast and database access systems, where the data should be accessible only to authorized users. Such schemes are very relevant in the context of pay television, and easily combine with and complement the Broadcast Encryption schemes of [6].",
author = "Benny Chor and Amos Fiat and Moni Naor",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1994.; null ; Conference date: 21-08-1994 Through 25-08-1994",
year = "1994",
doi = "10.1007/3-540-48658-5_25",
language = "אנגלית",
isbn = "9783540583332",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "257--270",
editor = "Desmedt, {Yvo G.}",
booktitle = "Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings",
}