Telecommunication and information techniques and system III
In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.
Saved in:
Main Authors: | Chua, Hock Chuan, Ma, Jianfeng, Lu, Xugang, Chiam, Tee Chye, Li, Gang |
---|---|
Format: | Research Report |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/2750 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Similar Items
-
Telecommunication techniques and systems (III)
by: Lu, Chao., et al.
Published: (2008) -
Telecommunication and information techniques and systems
by: Tan, Soon Hie.
Published: (2008) -
Telecommunication and information techniques and systems II
by: Fu, Jeffrey S., et al.
Published: (2008) -
Telecommunication techniques and systems 1 : fibre lasers for optical communication systems
by: Lai, Yicheng, et al.
Published: (2008) -
Telecommunication techniques and systems (II)
by: Gunawan, Erry., et al.
Published: (2008)