Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
226 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
|
187 | Aggelos Kiayias, Moti Yung |
On Crafty Pirates and Foxy Tracers.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
|
140 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts.  |
ACNS  |
2009 |
DBLP DOI BibTeX RDF |
|
86 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Pirate decoder for the broadcast encryption schemes from Crypto 2005.  |
Sci. China Ser. F Inf. Sci.  |
2007 |
DBLP DOI BibTeX RDF |
pirate decoder, broadcast encryption, traitor tracing |
72 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption.  |
CRYPTO  |
2000 |
DBLP DOI BibTeX RDF |
|
68 | Duong Hieu Phan |
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.  |
VIETCRYPT  |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.  |
ASIACRYPT  |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
58 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing.  |
CRYPTO  |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Jean-Philippe Humbert |
Les mondes de la cyberdélinquance et images sociales du pirate informatique. (The cyberdelinquency's worlds and the social images of the computer pirate).  |
|
2007 |
RDF |
|
43 | Amos Fiat, Tamir Tassa |
Dynamic Traitor Training.  |
CRYPTO  |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Gianluca Palermo, Cristina Silvano |
PIRATE: A Framework for Power/Performance Exploration of Network-on-Chip Architectures.  |
PATMOS  |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Nick Parlante, David Matuszek, Jeff Lehman, David Reed, John K. Estell, Donald D. Chinn |
Nifty assignments.  |
SIGCSE  |
2004 |
DBLP DOI BibTeX RDF |
minesweeper, pirate, education, object oriented programming, pedagogy, recursion, library, repository, assignments, examples, nifty, homeworks, cards |
29 | Pascal Junod, Alexandre Karlov, Arjen K. Lenstra |
Improving the Boneh-Franklin Traitor Tracing Scheme.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
Boneh-Franklin traitor tracing, Guruswami-Sudan algorithm, Reed-Solomon codes, Berlekamp-Massey algorithm |
29 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size.  |
ISC  |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Olivier Billet, Duong Hieu Phan |
Traitors Collaborating in Public: Pirates 2.0.  |
EUROCRYPT  |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Min-Jeong Lee, Kyung-Su Kim 0001, Heung-Kyu Lee |
Forensic Tracking Watermarking against In-theater Piracy.  |
Information Hiding  |
2009 |
DBLP DOI BibTeX RDF |
forensic tracking watermarking, in-theater piracy, local auto-correlation function (LACF) |
29 | Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo |
Efficient Coalition Detection in Traitor Tracing.  |
SEC  |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Aggelos Kiayias, Moti Yung |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.  |
Digital Rights Management Workshop  |
2008 |
DBLP DOI BibTeX RDF |
error correcting codes, traitor tracing |
29 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.  |
ICALP  |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
29 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards.  |
ACM Trans. Inf. Syst. Secur.  |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
29 | Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano |
A Practical Solution for Distribution Rights Protection in Multicast Environments.  |
ICCSA (3)  |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.  |
ICICS  |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
29 | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
A Traitor Tracing Scheme Based on RSA for Fast Decryption.  |
ACNS  |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Hervé Chabanne, Duong Hieu Phan, David Pointcheval |
Public Traceability in Traitor Tracing Schemes.  |
EUROCRYPT  |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Hans Georg Schaathun |
Fighting Two Pirates.  |
AAECC  |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards.  |
S&P  |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern |
Enhancing image watermarking methods with/without reference images by optimization on second-order statistics.  |
IEEE Trans. Image Process.  |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Aggelos Kiayias, Moti Yung |
Breaking and Repairing Asymmetric Public-Key Traitor Tracing.  |
Digital Rights Management Workshop  |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Jesse Schell, Joe Shochet |
Designing Interactive Theme Park Rides.  |
IEEE Computer Graphics and Applications  |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern |
Enhancing image watermarking methods by second order statistics.  |
ICIP (2)  |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Reihaneh Safavi-Naini, Yejing Wang |
Collusion Secure q-ary Fingerprinting for Perceptual Content.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
Traceability, fingerprinting codes, watermarking schemes |
29 | Reihaneh Safavi-Naini, Yejing Wang |
A Combinatorial Approach to Asymmetric Traitor Tracing.  |
COCOON  |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Moni Naor, Benny Pinkas |
Threshold Traitor Tracing.  |
CRYPTO  |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Ritu Patil, N. Vishal Goutham, G. R. Sunil Kumar, Surekha Borra |
AlexNet Based Pirate Detection System.  |
SN Comput. Sci.  |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Martin Paul Eve |
Lessons from the Library: Extreme Minimalist Scaling at Pirate Ebook Platforms.  |
Digit. Humanit. Q.  |
2022 |
DBLP BibTeX RDF |
|
25 | Raashida Amin, Arshia Ayoub, Sumeera Amin, Zahid Ashraf Wani |
Toll-based access vs pirate access: a webometric study of academic publishers.  |
Digit. Libr. Perspect.  |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Pierre-Emmanuel Arduin, Benjamin Costé |
Pirate ta fac ! Ludification de séances de cours sur la sécurité des systèmes d'information.  |
INFORSID  |
2022 |
DBLP BibTeX RDF |
|
25 | Synh Viet-Uyen Ha, Nhat Minh Chung, Cuong Tien Nguyen, Hung Ngoc Phan |
Tiny-PIRATE: A Tiny Model With Parallelized Intelligence for Real-Time Analysis as a Traffic countEr.  |
CVPR Workshops  |
2021 |
DBLP BibTeX RDF |
|
25 | Jack E. James |
Pirate open access as electronic civil disobedience: Is it ethical to breach the paywalls of monetized academic publishing?  |
J. Assoc. Inf. Sci. Technol.  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Sicong Zhou, Huawei Huang, Wuhui Chen, Pan Zhou, Zibin Zheng, Song Guo 0001 |
PiRATE: A Blockchain-Based Secure Framework of Distributed Machine Learning in 5G Networks.  |
IEEE Netw.  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Mark Zhandry |
Schrödinger's Pirate: How To Trace a Quantum Decoder.  |
IACR Cryptol. ePrint Arch.  |
2020 |
DBLP BibTeX RDF |
|
25 | Sascha Lichtenberg, Alfred Benedikt Brendel |
Arrr you a Pirate? Towards the Gamification Element "Lootbox".  |
AMCIS  |
2020 |
DBLP BibTeX RDF |
|
25 | Mark Zhandry |
Schrödinger's Pirate: How to Trace a Quantum Decoder.  |
TCC (3)  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Domenico Sardanelli, Agostino Vollero, Alfonso Siano, Gianmaria Bottoni |
Lowering the pirate flag: a TPB study of the factors influencing the intention to pay for movie streaming services.  |
Electron. Commer. Res.  |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Rúben Meireles, Pedro Campos 0001 |
Digital Piracy: Factors that Influence the Intention to Pirate - A Structural Equation Model Approach.  |
Int. J. Hum. Comput. Interact.  |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Sicong Zhou, Huawei Huang, Wuhui Chen, Zibin Zheng, Song Guo 0001 |
PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks.  |
CoRR  |
2019 |
DBLP BibTeX RDF |
|
25 | Simon P. Rose, M. P. Jacob Habgood, Tim Jay |
Using Pirate Plunder to Develop Children's Abstraction Skills in Scratch.  |
CHI Extended Abstracts  |
2019 |
DBLP DOI BibTeX RDF |
|
25 | R. Roopalakshmi |
A brand new application of visual-audio fingerprints: Estimating the position of the pirate in a theater - A case study.  |
Image Vis. Comput.  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Olivia Dziwak |
A reader in international media piracy: Pirate essays.  |
New Media Soc.  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan F. Lee |
Purchase, pirate, publicize: Private-network music sharing and market album sales.  |
Inf. Econ. Policy  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Kentaroh Toyoda, Tomoaki Ohtsuki, P. Takis Mathiopoulos |
Time Series Analysis for Bitcoin Transactions: The Case of Pirate@40's HYIP Scheme.  |
ICDM Workshops  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Marcela C. C. Bomfim, James R. Wallace |
Pirate Bri's Grocery Adventure: Teaching Food Literacy through Shopping.  |
CHI Extended Abstracts  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Paul McInnes, Ben Matthews |
Pirate Dice: An Ethnomethodological Analysis of Paired Playing.  |
CHI PLAY (Companion)  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Toby Green |
We've failed: Pirate black open access is trumping green and gold and we must change our approach.  |
Learn. Publ.  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Anke Kletsch, Tobias Trebeljahr, Toufik Abdedaim |
Pirate Smooch.  |
SIGGRAPH Computer Animation Festival  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Elena Maceviciute |
Review of: Hall, Gary. Pirate philosophy for a digital posthumanities. Cambridge, MA: MIT Press, 2016.  |
Inf. Res.  |
2016 |
DBLP BibTeX RDF |
|
25 | Tobias Trebeljahr, Toufik Abdedaim |
Pirate Smooch (Germany).  |
SIGGRAPH ASIA Computer Animation Festival  |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Christoph Carl Kling, Jérôme Kunegis, Heinrich Hartmann, Markus Strohmaier, Steffen Staab |
Voting Behaviour and Power in Online Democracy: A Study of LiquidFeedback in Germany's Pirate Party.  |
CoRR  |
2015 |
DBLP BibTeX RDF |
|
25 | Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr |
Flicker Forensics for Pirate Device Identification.  |
IH&MMSec  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Christoph Carl Kling, Jérôme Kunegis, Heinrich Hartmann, Markus Strohmaier, Steffen Staab |
Voting Behaviour and Power in Online Democracy: A Study of LiquidFeedback in Germany's Pirate Party.  |
ICWSM  |
2015 |
DBLP BibTeX RDF |
|
25 | Casey O'Donnell |
Mixed messages: The ambiguity of the MOD chip and pirate cultural production for the Nintendo DS.  |
New Media Soc.  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | |
Retraction notice to "The Pirate Bay deep-sixed" [2006] 22 CLSR 392-401.  |
Comput. Law Secur. Rev.  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Jessica L. Beyer |
The Emergence of a Freedom of Information Movement: Anonymous, WikiLeaks, the Pirate Party, and Iceland.  |
J. Comput. Mediat. Commun.  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Dorit Ron, Adi Shamir |
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?  |
Financial Cryptography Workshops  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | David Molyneaux, Selim Benhimane |
"It's a Pirate's Life" AR game.  |
ISMAR  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Mathupayas Thongmak |
Youth's Intention To Pirate Digital Products: Antecedents And Consequences.  |
UKAIS  |
2014 |
DBLP BibTeX RDF |
|
25 | Stefan Larsson |
Metaphors, law and digital phenomena: the Swedish pirate bay court case.  |
Int. J. Law Inf. Technol.  |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Hayes Mawindi Mabweazara |
'Pirate' radio, convergence and reception in Zimbabwe.  |
Telematics Informatics  |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Dorit Ron, Adi Shamir |
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?  |
IACR Cryptol. ePrint Arch.  |
2013 |
DBLP BibTeX RDF |
|
25 | Alexander Goldman, Monchu Chen |
Pirate island: an immersion-style language-learning RPG.  |
IDC  |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Xingwen Zhao, Fangguo Zhang |
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast.  |
Comput. Secur.  |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Boris Culik, Thomas Lehmann, Christoph Zebermann |
PITAS: Pirate and Terrorist Aversion System.  |
Future Security  |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Simon Lindgren, Ragnar Lundström |
Pirate culture and hacktivist mobilization: The cultural and social protocols of #WikiLeaks on Twitter.  |
New Media Soc.  |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Prodromos Tsiavos, Petros S. Stefaneas |
Beyond the Boundaries of Open, Closed and Pirate Archives: Lessons from a Hybrid Approach  |
CoRR  |
2011 |
DBLP BibTeX RDF |
|
25 | Aggelos Kiayias |
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.  |
IWCC  |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu |
Defending against the pirate evolution attack.  |
Int. J. Appl. Cryptogr.  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Yongdong Wu, Robert H. Deng |
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes.  |
J. Comput. Sci. Technol.  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Ramesh Illikkal, Vineet Chadha, Andrew Herdrich, Ravi R. Iyer 0001, Donald Newell |
PIRATE: QoS and performance management in CMP architectures.  |
SIGMETRICS Perform. Evaluation Rev.  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Min-Jeong Lee, Kyung-Su Kim 0001, Heung-Kyu Lee |
Digital Cinema Watermarking for Estimating the Position of the Pirate.  |
IEEE Trans. Multim.  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Sigi Goode |
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups.  |
Inf. Manag. Comput. Secur.  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Linda Spark |
The Demographic Factors Affecting University Students' Intention to Pirate Software.  |
HCC  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Leslie Esher, Stacey Hall, Eva D. Regnier, Paul J. Sanchez, James A. Hansen, Dashi Singham |
Simulating pirate behavior to exploit environmental information.  |
WSC  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Russell Glenn, Yong Zhang, Matthew Krasin, Chiaho Hua |
PIRATE: pediatric imaging response assessment and targeting environment.  |
Medical Imaging: Image-Guided Procedures  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Yongdong Wu, Feng Bao 0001, Ying Qiu |
Tracing Stateful Pirate Decoders.  |
ICC  |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Hongxia Jin, Jeffrey B. Lotspiech |
Defending against the Pirate Evolution Attack.  |
ISPEC  |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Bertrand Chupeau, Ayoub Massoudi, Frédéric Lefèbvre |
In-theater piracy: finding where the pirate was.  |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents  |
2008 |
DBLP DOI BibTeX RDF |
|
25 | |
RETRACTED: The Pirate Bay deep-sixed.  |
Comput. Law Secur. Rev.  |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari |
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing.  |
J. Univers. Comput. Sci.  |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari |
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing  |
CoRR  |
2005 |
DBLP BibTeX RDF |
|
25 | Peter Buxmann, Gerrit Pohl, Patrick Johnscher, Jochen Strube, Hans-Dieter Groffmann |
Strategies for Digital Music Markets: Pricing and the Effectiveness of Measures against Pirate Copies - Results of an Empirical Study.  |
ECIS  |
2005 |
DBLP BibTeX RDF |
|
25 | David M. Goldschlag, David W. Kravitz |
Pirate Card Rejection.  |
CARDIS  |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Hsing Kenneth Cheng, Ronald R. Sims, Hildy Teegen |
To Purchase or to Pirate Software: An Empirical Study.  |
J. Manag. Inf. Syst.  |
1997 |
DBLP DOI BibTeX RDF |
|
25 | Diana E. D'Angelo |
You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence.  |
SIGUCCS  |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Ilya Dumer |
Equal-Weight Fingerprinting Codes.  |
IWCC  |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ehsan Amiri, Gábor Tardos |
High rate fingerprinting codes and the fingerprinting capacity.  |
SODA  |
2009 |
DBLP DOI BibTeX RDF |
|
14 | MoonShik Lee, Daegun Ma, MinJae Seo |
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.  |
ACNS  |
2009 |
DBLP DOI BibTeX RDF |
public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis |
14 | Dan Boneh, Moni Naor |
Traitor tracing with constant size ciphertext.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
encryption, traitor tracing, fingerprinting codes |
14 | Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson 0002, Nimrod Megiddo |
Adaptive traitor tracing for large anonymous attack.  |
Digital Rights Management Workshop  |
2008 |
DBLP DOI BibTeX RDF |
security, traitor tracing, content protection |
14 | Vaddadi P. Chandu, Karandeep Singh, Ravi Baskaran |
A Model for Prevention of Software Piracy through Secure Distribution.  |
SCSS (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan |
Traitor Tracing with Optimal Transmission Rate.  |
ISC  |
2007 |
DBLP DOI BibTeX RDF |
Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes |