Pirate evolution: How to make the most of your traitor keys A Kiayias, S Pehlivanoglu Annual International Cryptology Conference, 448-465, 2007 | 41 | 2007 |
Detecting and revoking pirate redistribution of content A Kiayias, S Pehlivanoglu US Patent 9,015,850, 2015 | 27 | 2015 |
Encryption for digital content A Kiayias, S Pehlivanoglu Springer Science & Business Media, 2010 | 22 | 2010 |
Encryption for digital content A Kiayias, S Pehlivanoglu Springer Science & Business Media, 2010 | 22 | 2010 |
Tracing and revoking pirate rebroadcasts A Kiayias, S Pehlivanoglu Applied Cryptography and Network Security: 7th International Conference …, 2009 | 21 | 2009 |
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking S Pehlivanoglu Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 13 | 2013 |
Improving the round complexity of traitor tracing schemes A Kiayias, S Pehlivanoglu Applied Cryptography and Network Security: 8th International Conference …, 2010 | 9 | 2010 |
Generic Construction of Trace and Revoke Schemes M Ak, A Kiayias, S Pehlivanoglu, AA Selçuk | 6 | 2012 |
On the security of a public-key traitor tracing scheme with sublinear ciphertext size A Kiayias, S Pehlivanoglu Proceedings of the nineth ACM workshop on Digital rights management, 1-10, 2009 | 5 | 2009 |
Encryption mechanisms for digital content distribution S Pehlivanoglu University of Connecticut, 2009 | 3 | 2009 |
Traitor tracing in a content protection system H Jin, S Pehlivanoglu US Patent 8,533,849, 2013 | 1 | 2013 |
Attacking traitor tracing schemes using history recording and abrupt decoders A Kiayias, S Pehlivanoglu Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011 | 1 | 2011 |
Defending against the pirate evolution attack H Jin, J Lotspiech, S Pehlivanoglu International Journal of Applied Cryptography 2 (1), 23-34, 2010 | 1 | 2010 |
Traitor tracing without a priori bound on the coalition size H Jin, S Pehlivanoglu International Conference on Information Security, 234-241, 2009 | 1 | 2009 |
Traitor tracing without a priori bound on the coalition size H Jin, S Pehlivanoglu International Conference on Information Security, 234-241, 2009 | 1 | 2009 |
Broadcast and Content Distribution S Pehlivanoglu Handbook of Financial Cryptography and Security, 133-159, 2010 | | 2010 |
Broadcast and Content Distribution S Pehlivanoglu Handbook of Financial Cryptography and Security, 133-159, 2010 | | 2010 |
Broadcast Encryption A Kiayias, S Pehlivanoglu Encryption for Digital Content, 35-105, 2010 | | 2010 |
Traitor Tracing A Kiayias, S Pehlivanoglu Encryption for Digital Content, 107-149, 2010 | | 2010 |
Trace and Revoke Schemes A Kiayias, S Pehlivanoglu Encryption for Digital Content, 151-169, 2010 | | 2010 |