Telecommunication and information techniques and system III

Abstract

In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.RGM 16/9

    Similar works