您要查找的是不是:
- The online/offline encryption scheme is a solution to increase encryption speed. 在线/离线加密方案旨在提高在线加密速度。
- The homomorphism key agreement based on IBE and homomorphic encryption scheme is presented. 该协议建立的会话密钥是等献的、前向保密的。
- Then identity-based binary tree encryption scheme is constructed.As a result, a concrete IBE-NIKU is given. 基于已有的二叉树加密构造了基于身份的二叉树加密方案及非交互式密钥更新的基于身份加密方案;
- WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP是一种加密方案的基础上的RC - 4加密,即对所有802.;11a,b和g无线的产品。
- Broadcast encryption scheme is a widely used cryptosystem for a group of receivers. 摘要 广播加密是一种应用广泛的群组保密通信系统。
- An authenticated encryption scheme based on self certified of public key from bilinear pairings is proposed. 提出了一种基于双线性对和公钥自证明的认证加密方案。
- Similarly, the encryption and validation keys and the encryption scheme and validation scheme used for cookie data must be exactly the same. 同样,用于Cookie数据的加密和验证密钥以及加密方案和验证方案也必须完全相同。
- Based on the elliptic curve cryptosystem, this paper proposes an authenticated encryption scheme with message recovery and message linkage recovery. 分别提出了基于椭圆曲线的具有消息恢复和消息链接恢复的认证加密方案。
- As expected, you need to use the same encryption scheme on all devices on your network for communication to be successful. 可以想到,你对你所有的网络服务需要用同样的加密方法来使你的通讯能成功进行。
- In this paper, generalized Knight's Tour Problem (KTP) is combined with video encryption, and a novel video encryption scheme is proposed. 摘要将广义骑士巡游与视频加密相结合,提出了一种新的视频加密方案。
- A publicly verifiable encryption scheme allows any entity to verify that a cipher-text hides the same message as committed before without revealing it. 可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。
- To improve the security features of chaotic communication system,a chaotic encryption scheme was developed based on piecewise parabolic map,and composite sequence was used. 为提高混沌通信系统的安全性能,在分段抛物映射基础上提出一种利用复合序列的混沌加密方案。
- According to the MOV reduction theory,the identity-based encryption scheme which is based on the bilinear map will lose the high efficiency of elliptic curve. 根据MOV归约理论,采用双线性映射构造的基于身份加密方案使得该方案不具有椭圆曲线高效的优点。
- As compared to Hsu and Wu ’s authenticated encryption scheme with(t,n)shared verification,the proposed scheme has the following advantages:it is more efficient for signature generation and encryption; it can detect malicious verifiers cheating others. 该方案与Hsu和wu提出的具有门限共享验证的认证加密方案相比,签名加密效率更高,可以检测恶意的接收组成员。
- Based on the stateless broadcast encryption scheme with Complete-Subtree method using the X509 certificate, this paper discusses the design of a secure Multimedia system and implements a scalable, flexible and more robust DRM system for Multimedia. 本文首先利用基于X509证书的广播加密的完全子树(CS)方案设计并实现了一个灵活、安全的视频数字版权管理系统。
- Ajtai and Dwork have introduced a probabilistic public key encryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst case. Ajtai和 Dwork构造了一种概率公用密钥体系 .;这种密码系统的安全性建立在一种格问题复杂性的最坏情形上
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family( CFF). 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。
- In addition, the grid application must handle both symmetric and asymmetric encryption schemes. 此外,网格应用程序必须处理对称及非对称的加密方案。
- Considering the characteristics of EPON,we introduce a"churning"policy and modify the process of register and OAM frames,thus to achieve an efficient authentication and encryption scheme. 重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family (CFF) . 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。