{"id":"https://openalex.org/W1991439166","doi":"https://doi.org/10.1109/wifs.2012.6412656","title":"Dynamic traitor tracing for arbitrary alphabets: Divide and conquer","display_name":"Dynamic traitor tracing for arbitrary alphabets: Divide and conquer","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W1991439166","doi":"https://doi.org/10.1109/wifs.2012.6412656","mag":"1991439166"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2012.6412656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023482258","display_name":"Thijs Laarhoven","orcid":"https://orcid.org/0000-0002-2369-9067"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Thijs Laarhoven","raw_affiliation_strings":["Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, AZ, The Netherlands","Department of Mathematics and Computer Science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, AZ, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The Netherlands#TAB#","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042903958","display_name":"Jan-Jaap Oosterwijk","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jan-Jaap Oosterwijk","raw_affiliation_strings":["Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, AZ, The Netherlands","Department of Mathematics and Computer Science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, AZ, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The Netherlands#TAB#","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109964551","display_name":"Jeroen Doumen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155963","display_name":"Western Digital (Netherlands)","ror":"https://ror.org/05f4fbs05","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210121352","https://openalex.org/I4210155963"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jeroen Doumen","raw_affiliation_strings":["Irdeto BV, LS Hoofddorp, The Netherlands","Irdeto BV Taurus Avenue 105, 2132 LS Hoofddorp, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Irdeto BV, LS Hoofddorp, The Netherlands","institution_ids":["https://openalex.org/I4210155963"]},{"raw_affiliation_string":"Irdeto BV Taurus Avenue 105, 2132 LS Hoofddorp, The Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023482258"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":4.1656,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94642325,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"54","issue":null,"first_page":"240","last_page":"245"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traitor-tracing","display_name":"Traitor tracing","score":0.9072954654693604},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7203667163848877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.621350884437561},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.6004858016967773},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5273036956787109},{"id":"https://openalex.org/keywords/alphabet","display_name":"Alphabet","score":0.4994208812713623},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4905094504356384},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4830818474292755},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3908597230911255},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33267319202423096},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15064719319343567},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.139174222946167},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.12908804416656494}],"concepts":[{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.9072954654693604},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7203667163848877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.621350884437561},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.6004858016967773},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5273036956787109},{"id":"https://openalex.org/C112876837","wikidata":"https://www.wikidata.org/wiki/Q837518","display_name":"Alphabet","level":2,"score":0.4994208812713623},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4905094504356384},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4830818474292755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3908597230911255},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33267319202423096},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15064719319343567},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.139174222946167},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.12908804416656494},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":11,"locations":[{"id":"doi:10.1109/wifs.2012.6412656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Laarhoven, T, Oosterwijk, J-J & Doumen, J 2012, Dynamic traitor tracing for arbitrary alphabets: divide and conquer. in Proceedings of the International Workshop on Information Forensics and Security (WIFS, Tenerife, Spain, December 2-5, 2012). Institute of Electrical and Electronics Engineers, Piscataway, pp. 240-245, 2012 IEEE International Workshop on Information Forensics and Security (WIFS 2012), Tenerife, Spain, 2/12/12. https://doi.org/10.1109/WIFS.2012.6412656","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arXiv.org:1206.6720","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1206.6720","pdf_url":"https://arxiv.org/pdf/1206.6720","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:tue:oai:pure.tue.nl:publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","pdf_url":"https://research.tue.nl/nl/publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the International Workshop on Information Forensics and Security (WIFS, Tenerife, Spain, December 2-5, 2012), 240 - 245","raw_type":"info:eu-repo/semantics/conferencepaper"},{"id":"pmh:750610","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=750610","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.759.2249","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.759.2249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://arxiv.org/pdf/1206.6720.pdf","raw_type":"text"},{"id":"pmh:oai:library.tue.nl:750610","is_oa":false,"landing_page_url":"http://repository.tue.nl/750610","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:803863","is_oa":false,"landing_page_url":"http://repository.tue.nl/803863","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:library.tue.nl:892223","is_oa":false,"landing_page_url":"http://repository.tue.nl/892223","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:pure.tue.nl:openaire/30dedfa7-836d-48a3-a281-14bca52dada1","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/30dedfa7-836d-48a3-a281-14bca52dada1","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Laarhoven, T M M, Oosterwijk, J-J & Doumen, J 2012, Dynamic traitor tracing for arbitrary alphabets: divide and conquer. arXiv.org, vol. 1206.6702 [cs.CR].","raw_type":"book"},{"id":"pmh:tue:oai:pure.tue.nl:publications/30dedfa7-836d-48a3-a281-14bca52dada1","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/30dedfa7-836d-48a3-a281-14bca52dada1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/report"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/7b1eada1-4e05-4d7e-910b-e8ad1539e9d6","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Laarhoven, T, Oosterwijk, J-J & Doumen, J 2012, Dynamic traitor tracing for arbitrary alphabets: divide and conquer. in Proceedings of the International Workshop on Information Forensics and Security (WIFS, Tenerife, Spain, December 2-5, 2012). Institute of Electrical and Electronics Engineers, Piscataway, pp. 240-245, 2012 IEEE International Workshop on Information Forensics and Security (WIFS 2012), Tenerife, Spain, 2/12/12. https://doi.org/10.1109/WIFS.2012.6412656","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W286861583","https://openalex.org/W1546855683","https://openalex.org/W1587463421","https://openalex.org/W1977832049","https://openalex.org/W2028533236","https://openalex.org/W2031722321","https://openalex.org/W2039632567","https://openalex.org/W2042587503","https://openalex.org/W2043584522","https://openalex.org/W2057182007","https://openalex.org/W2083594366","https://openalex.org/W2087879325","https://openalex.org/W2131267390","https://openalex.org/W2134195444","https://openalex.org/W2145102561","https://openalex.org/W2151066003","https://openalex.org/W2157531972","https://openalex.org/W2164530213","https://openalex.org/W4230834613","https://openalex.org/W6632759768","https://openalex.org/W6634897060","https://openalex.org/W6681481313"],"related_works":["https://openalex.org/W1561762905","https://openalex.org/W2613516814","https://openalex.org/W2989083936","https://openalex.org/W2109661373","https://openalex.org/W1510640641","https://openalex.org/W2140065445","https://openalex.org/W3196755287","https://openalex.org/W2555433399","https://openalex.org/W2366712519","https://openalex.org/W2351957531"],"abstract_inverted_index":{"We":[0],"give":[1],"a":[2,25,60,74,87],"generic":[3],"divide-and-conquer":[4],"approach":[5],"for":[6,81],"constructing":[7],"collusion-resistant":[8],"probabilistic":[9,83,90],"dynamic":[10,46,91],"traitor":[11,92],"tracing":[12,93],"schemes":[13,18,55],"with":[14,19],"larger":[15],"alphabets":[16],"from":[17],"smaller":[20],"alphabets.":[21],"This":[22,85],"construction":[23],"offers":[24],"linear":[26],"tradeoff":[27],"between":[28,99],"the":[29,33,44,65,78,97,100,111],"alphabet":[30,66],"size":[31],"and":[32,95,110,119],"codelength.":[34],"In":[35],"particular,":[36],"we":[37],"show":[38],"that":[39,56],"applying":[40],"our":[41],"results":[42],"to":[43,54,63,73,77],"binary":[45],"Tardos":[47],"scheme":[48,105,116],"of":[49,89,106,117],"Laarhoven":[50,107],"et":[51,108],"al.":[52,109],"leads":[53],"are":[57],"shorter":[58],"by":[59],"factor":[61],"equal":[62],"half":[64],"size.":[67],"Asymptotically,":[68],"these":[69],"codelengths":[70],"correspond,":[71],"up":[72],"constant":[75],"factor,":[76],"fingerprinting":[79],"capacity":[80],"static":[82],"schemes.":[84],"gives":[86],"hierarchy":[88],"schemes,":[94],"bridges":[96],"gap":[98],"low":[101,114],"bandwidth,":[102,113],"high":[103,112],"codelength":[104,115],"Fiat":[118],"Tassa.":[120]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":8}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
