HIGHLIGHTS
- who: Tiziano Bianchi from the we can rely on efficient protocols for securely distributing, in an asymmetric way, an encrypted version of such binary codes [5, ]By relaxing these constraints, it would be possible to exploit more powerful non-binary anticollusion codes in the Tardos solutions [19, , ]. Extending the current protocols in order to work with non-binary fingerprints is expected to improve the results and is left for future work. Competing interests The authors declare that they have no competing interests. Author details , Department of Electronics and Telecommunications, Politecnico di Torino, Corso Duca Degli Abruzzi, , Torino . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.