Secure frameproof codes, key distribution patterns, group testing algorithms and related structures

DR Stinson, T Van Trung, R Wei - Journal of Statistical Planning and …, 2000 - Elsevier
Frameproof codes were introduced by Boneh and Shaw as a method of “digital
fingerprinting” which prevents a coalition of a specified size c from framing a user not in the …

Digital fingerprinting codes: Problem statements, constructions, identification of traitors

A Barg, GR Blakley… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
We consider a general fingerprinting problem of digital data under which coalitions of users
can alter or erase some bits in their copies in order to create an illegal copy. Each user is …

A hypergraph approach to the identifying parent property: the case of multiple parents

A Barg, G Cohen, S Encheva, G Kabatiansky… - SIAM Journal on Discrete …, 2001 - SIAM
Let C be a code of length n over an alphabet of q letters. An n-word y is called a descendant
of a set of t codewords x 1,..., xt if y_i∈{x^1_i,\dots,x^t_i\} for all i= 1,..., n. A code is said to …

On the extremal combinatorics of the Hamming space

J Körner - Journal of Combinatorial Theory, Series A, 1995 - Elsevier
We present new asymptotic bounds for problems in extremal set theory related to finding the
maximum number of qualitatively 3-independent bipartitions of an n-set. We consider the …

[BOOK][B] Asymptotic overview on separating codes

GD Cohen, HG Schaathun - 2003 - researchgate.net
Separating codes (or systems) are known from combinatorics, and they enjoy increasing
attention due to applications in digital fingerprinting. Previous applications are found in …

Partition information and its transmission over boolean multi-access channels

S Wu, S Wei, Y Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we propose a novel reservation system to study partition information and its
transmission over a noise-free Boolean multiaccess channel. The objective of transmission …

[HTML][HTML] Intersecting codes and separating codes

G Cohnen, S Encheva, S Litsyn… - Discrete Applied …, 2003 - Elsevier
Let Γ be a code of length n. Then x is called a descendant of the coalition of codewords a,
b,…, e if xi∈{ai, bi,…, ei} for i= 1,…, n. We study codes with the following property: any two …

Compressing inconsistent data

J Korner, M Lucertini - IEEE Transactions on Information …, 1994 - ieeexplore.ieee.org
In a frequent practical situation one possesses inconsistent fragmentary data concerning
some industrial process or natural phenomenon. It is an interesting and reasonable task to …

On greedy algorithms in coding theory

GD Cohen, S Litsyn, C Zemor - IEEE Transactions on …, 1996 - ieeexplore.ieee.org
We study a wide class of problems in coding theory for which we consider two different
formulations: in terms of incidence matrices and in terms of hypergraphs. These problems …

Separable collusion-secure multimedia codes

EE Egorova, GA Kabatiansky - Problems of Information Transmission, 2021 - Springer
Separable Collusion-Secure Multimedia Codes | Problems of Information Transmission Skip to
main content SpringerLink Account Menu Find a journal Publish with us Track your research …