Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BOK][B] List decoding of error-correcting codes: winning thesis of the 2002 ACM doctoral dissertation competition
V Guruswami - 2004 - books.google.com
How can one exchange information e? ectively when the medium of com-nication introduces
errors? This question has been investigated extensively starting with the seminal works of …
errors? This question has been investigated extensively starting with the seminal works of …
[BOK][B] Asymptotic overview on separating codes
GD Cohen, HG Schaathun - 2003 - researchgate.net
Separating codes (or systems) are known from combinatorics, and they enjoy increasing
attention due to applications in digital fingerprinting. Previous applications are found in …
attention due to applications in digital fingerprinting. Previous applications are found in …
Guessing secrets efficiently via list decoding
We consider the guessing secrets problem defined by Chung et al.[2001]. This is a variant of
the standard 20 questions game where the player has a set of k> 1 secrets from a universe …
the standard 20 questions game where the player has a set of k> 1 secrets from a universe …
Token-controlled public key encryption
Abstract “Token-controlled public key encryption” is a public key encryption scheme where
individual message can be encrypted and sent to every receiver, but the receiver cannot …
individual message can be encrypted and sent to every receiver, but the receiver cannot …
Fingerprinting concatenated codes with efficient identification
M Fernández, M Soriano - International Conference on Information …, 2002 - Springer
A fingerprinting code is a set of codewords that are embedded in each copy of a digital
object, with the purpose of making each copy unique. If the fingerprinting code is c-secure …
object, with the purpose of making each copy unique. If the fingerprinting code is c-secure …
More on (2, 2)-separating systems
G Cohen, S Encheva… - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The theory of separating systems has been applied in different areas of science and
technology such as automata synthesis, technical diagnosis, and authenticating ownership …
technology such as automata synthesis, technical diagnosis, and authenticating ownership …
Improved bounds for separating hash families
M Bazrafshan, T Van Trung - Designs, codes and cryptography, 2013 - Springer
Abstract An (N; n, m,{w_1, ..., w_t\})-separating hash family is a set H of N functions h:\; X ⟶ Y
with| X|= n,| Y|= m, t ≧ 2 having the following property. For any pairwise disjoint subsets …
with| X|= n,| Y|= m, t ≧ 2 having the following property. For any pairwise disjoint subsets …
Guessing secrets with inner product questions
We suppose we are given some fixed (but unknown) subset X of a set Ω= 𝔽 n 2, where 𝔽2
denotes the field of two elements. Our goal is to learn as much as possible about the …
denotes the field of two elements. Our goal is to learn as much as possible about the …
Constructions of almost secure frameproof codes with applications to fingerprinting schemes
J Moreira, M Fernández, G Kabatiansky - Designs, Codes and …, 2018 - Springer
This paper presents explicit constructions of fingerprinting codes. The proposed
constructions use a class of codes called almost secure frameproof codes. An almost secure …
constructions use a class of codes called almost secure frameproof codes. An almost secure …
[PDF][PDF] Separating hash families
M Bazrafshan - 2011 - core.ac.uk
In der vorliegenden Dissertation wird angestrebt, offene Probleme im Zusammenhang mit
sogenannten “separating hash families” zu diskutieren und zu lösen. Separating hash …
sogenannten “separating hash families” zu diskutieren und zu lösen. Separating hash …