Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Serdar Pehlivanoglu
2010 – today
- 2012
[i1]Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk: Generic Construction of Trace and Revoke Schemes. IACR Cryptology ePrint Archive 2012: 531 (2012)- 2011
[c6]Aggelos Kiayias, Serdar Pehlivanoglu: Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. ISC 2011: 17-31- 2010
[b1]Aggelos Kiayias, Serdar Pehlivanoglu: Encryption for Digital Content. Advances in Information Security 52, Springer 2010, ISBN 978-1-4419-0043-2, pp. 1-197
[j1]Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu: Defending against the pirate evolution attack. IJACT 2(1): 23-34 (2010)
[c5]Aggelos Kiayias, Serdar Pehlivanoglu: Improving the Round Complexity of Traitor Tracing Schemes. ACNS 2010: 273-290
2000 – 2009
- 2009
[c4]
[c3]Aggelos Kiayias, Serdar Pehlivanoglu: On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Digital Rights Management Workshop 2009: 1-10
[c2]Hongxia Jin, Serdar Pehlivanoglu: Traitor Tracing without A Priori Bound on the Coalition Size. ISC 2009: 234-241- 2007
[c1]Aggelos Kiayias, Serdar Pehlivanoglu: Pirate Evolution: How to Make the Most of Your Traitor Keys. CRYPTO 2007: 448-465
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:59 CEST by the dblp team



