Traitor tracing for anonymous attack in content protectionHongxia Jin2008SECRYPT 2008Conference paper