Gregory A. Kabatiansky
According to our database1,
Gregory A. Kabatiansky
authored at least 66 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A constructive approach to multimedia codes with complete traceability resistant to δ-noise.
Proceedings of the IEEE Information Theory Workshop, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
2021
2020
Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise.
Probl. Inf. Transm., 2020
Adversarial multiple access channels and a new model of multimedia fingerprinting coding.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020
2019
IEEE Trans. Inf. Theory, 2019
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing.
Des. Codes Cryptogr., 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing.
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
Constructions of almost secure frameproof codes with applications to fingerprinting schemes.
Des. Codes Cryptogr., 2018
2017
Proceedings of the Coding Theory and Applications - 5th International Castle Meeting, 2017
2016
Des. Codes Cryptogr., 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
Probl. Inf. Transm., 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
2013
IEEE Trans. Inf. Theory, 2013
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.
Proceedings of the Advances in Information and Computer Security, 2013
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk).
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
2009
Probl. Inf. Transm., 2009
2008
List Decoding of Biorthogonal Codes and the Hadamard Transform With Linear Complexity.
IEEE Trans. Inf. Theory, 2008
2007
Soft-Decision List Decoding with Linear Complexity for the First-Order Reed-Muller Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
2004
Proceedings of the Handbook of Discrete and Computational Geometry, Second Edition., 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Random coding technique for digital fingerprinting codes: fighting two pirates revisited.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2003
Digital fingerprinting codes: problem statements, constructions, identification of traitors.
IEEE Trans. Inf. Theory, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
2001
A hypergraph approach to the identifying parent property: the case of multiple parents.
Electron. Notes Discret. Math., 2001
1997
Proceedings of the Cryptography and Coding, 1997
1996
IEEE Trans. Inf. Theory, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
1995
Proceedings of the Advances in Cryptology, 1995
1993
Proceedings of the Algebraic Coding, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Error Control, Cryptology, and Speech Compression, 1993
Proceedings of the Advances in Cryptology, 1993