Telecommunication and information techniques and system III
In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.
Main Authors: | Chua, Hock Chuan, Ma, Jianfeng, Lu, Xugang, Chiam, Tee Chye, Li, Gang |
---|---|
Format: | Research Report |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/2750 |
Similar Items
-
Telecommunication techniques and systems (III)
by: Lu, Chao., et al.
Published: (2008) -
Telecommunication and information techniques and systems
by: Tan, Soon Hie.
Published: (2008) -
Telecommunication techniques and systems 1 : fibre lasers for optical communication systems
by: Lai, Yicheng, et al.
Published: (2008) -
Telecommunication techniques and systems (II)
by: Gunawan, Erry., et al.
Published: (2008) -
Telecommunication techniques and systems (IV): all-optical timing techniques in ultra-high speed optical time-division-multiplexed system
by: Law, Choi Look, et al.
Published: (2008)