• Design two traitor tracing schemes.

    设计两种叛逆者追踪方案

    youdao

  • A traitor tracing scheme based on m sequence is proposed.

    文中提出一种基于M序列叛逆追踪方案

    youdao

  • This paper proposes a public key traitor tracing scheme based on RSA.

    提出一种基于RSA公钥叛逆追踪方案

    youdao

  • This paper proposes a new PKI-based public-key traitor tracing scheme.

    给出一个新的基于PKI公钥追踪体制

    youdao

  • ECC - based traitor tracing scheme is constructed with an error correcting code.

    基于纠错叛逆者追踪模型通过纠错来构造的。

    youdao

  • This paper proposed a new discrete logarithm based public key traitor tracing scheme.

    给出一个新的基于离散对数的公钥追踪体制

    youdao

  • Analyze and summarize the performance of the presented traitor tracing schemes in detail.

    对已有叛逆者追踪方案性能进行了分析总结

    youdao

  • Traitor tracing is a kind of broadcast with traceability, which falls into the category of fingerprinting.

    叛逆者追踪一种可以追踪广播加密算法,也属于数字指纹范畴

    youdao

  • Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.

    利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。

    youdao

  • A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.

    公钥加密算法追踪算法结合在一起,构成个公钥广播加密方案

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.

    基于非对称公钥叛逆者追踪方案给出了新的电子软件销售产权保护模型,适用于一类需要安装运行的软件。

    youdao

  • A new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.

    为了解决数字版权保护中的用户密钥泄漏问题提出了一种基于线性映射的叛逆者追踪方案

    youdao

  • In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.

    实际通常是把叛逆者追踪方案广播加密方案有效地结合起来使盗版造成损失最小化。

    youdao

  • In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.

    本文中,笔者着重研究如何利用现代密码技术构造叛逆者追踪方案数字版权保护方案。

    youdao

  • Absrtact: Traitor tracing schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to content.

    摘 要一些共谋者试图构造盗版解码器获取数据内容非法访问的时候,叛逆者追踪模型可以用来发现至少其中的叛逆者。

    youdao

  • At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;

    目前对抗共谋密钥攻击叛徒追踪方案主要对称追踪方案、非对称追踪方案、门限追踪方案;

    youdao

  • At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.

    同时利用叛逆者追踪方案构造出签发电子证书软件安装方案,从而给出了有效数字版权保护方案。

    youdao

  • At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.

    同时利用叛逆者追踪方案构造出签发电子证书软件安装方案,从而给出了有效数字版权保护方案。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定