2003 |
12 | EE | Yejing Wang,
Jennifer Seberry,
Reihaneh Safavi-Naini,
Ryoh Fuji-Hara:
A Note on the Exposure Property of SBIBD.
Electronic Notes in Discrete Mathematics 15: 225-227 (2003) |
11 | | Reihaneh Safavi-Naini,
Yejing Wang:
Sequential traitor tracing.
IEEE Transactions on Information Theory 49(5): 1319-1326 (2003) |
2002 |
10 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Traitor Tracing for Shortened and Corrupted Fingerprints.
Digital Rights Management Workshop 2002: 81-100 |
9 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini,
Yejing Wang:
A 2-Secure Code with Efficient Tracing Algorithm.
INDOCRYPT 2002: 149-162 |
2001 |
8 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Collusion Secure q-ary Fingerprinting for Perceptual Content.
Digital Rights Management Workshop 2001: 57-75 |
7 | | Reihaneh Safavi-Naini,
Yejing Wang:
New results on frame-proof codes and traceability schemes.
IEEE Transactions on Information Theory 47(7): 3029-3033 (2001) |
2000 |
6 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
A Combinatorial Approach to Asymmetric Traitor Tracing.
COCOON 2000: 416-425 |
5 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Sequential Traitor Tracing.
CRYPTO 2000: 316-332 |
4 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Anonymous Traceability Schemes with Unconditional Security.
INDOCRYPT 2000: 250-261 |
1999 |
3 | EE | Dingyi Pei,
Yuqiang Li,
Yejing Wang,
Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration.
ACISP 1999: 303-313 |
2 | | Yejing Wang,
Reihaneh Safavi-Naini:
A3-Codes under Collusion Attacks.
ASIACRYPT 1999: 390-398 |
1998 |
1 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Bounds and Constructions for A3-code with Multi-senders.
ACISP 1998: 159-168 |