Loading...
Loading...

Go to the content (press return)

Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information

Author
Soriano, M.; Fernandez, M.; Cotrina, J.
Type of activity
Journal article
Journal
Lecture notes in computer science
Date of publication
2005-09
Volume
3710
First page
231
Last page
243
DOI
https://doi.org/10.1007/11551492_18 Open in new window
URL
http://link.springer.com/chapter/10.1007/11551492_18 Open in new window
Group of research
ISG - Information Security Group
WNG - Wireless Networks Group

Participants