• A traitor tracing scheme based on m sequence is proposed.

    文中提出一种基于M序列叛逆追踪方案

    youdao

  • This paper proposes a public key traitor tracing scheme based on RSA.

    提出一种基于RSA公钥叛逆追踪方案

    youdao

  • This paper proposes a new PKI-based public-key traitor tracing scheme.

    给出一个新的基于PKI公钥追踪体制

    youdao

  • ECC - based traitor tracing scheme is constructed with an error correcting code.

    基于纠错叛逆者追踪模型通过纠错来构造的。

    youdao

  • This paper proposed a new discrete logarithm based public key traitor tracing scheme.

    给出一个新的基于离散对数的公钥追踪体制

    youdao

  • Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.

    利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.

    基于非对称公钥叛逆者追踪方案给出了新的电子软件销售产权保护模型,适用于一类需要安装运行的软件。

    youdao

  • A new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.

    为了解决数字版权保护中的用户密钥泄漏问题提出了一种基于线性映射的叛逆者追踪方案

    youdao

  • In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.

    本文中,笔者着重研究如何利用现代密码技术构造叛逆者追踪方案数字版权保护方案。

    youdao

  • At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.

    同时利用叛逆者追踪方案构造出签发电子证书软件安装方案,从而给出了有效数字版权保护方案。

    youdao

  • A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.

    公钥加密算法追踪算法结合在一起,构成个公钥广播加密方案

    youdao

  • A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.

    公钥加密算法追踪算法结合在一起,构成个公钥广播加密方案

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定