您要查找的是不是:
- A traitor tracing scheme based on M sequence is proposed. 文中提出一种基于M序列的叛逆追踪方案。
- Traitor tracing scheme is a branch of digital fingerprinting,which provides a useful tool for copyright protection. 叛逆者追踪是数字指纹的一个分支,为版权保护提供了一个重要工具。
- By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme. 利用rs码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
- Meanwhile, the new traitor tracing scheme is reconstructed by modified RSA algorithms and its efficiency is also improved. 同时利用修改的RSA算法重新构造叛逆者追踪方案,使其效率得到了提高。
- Ma Hua et al's traitor tracing scheme based on RSA is analyzed, an obvious bug in which is found, and the problem is solved by introducing a random number. 文章对马华等人基于RSA加密算法的叛逆者追踪方案进行分析后,发现该方案存在一个明显的漏洞,并引入随机数解决了存在的问题。
- He Xinhua et al's public key traitor tracing scheme based on discrete logarithm problem is analyzed, the scheme is actually limited by the revocable threshold, which means the total number of revocable users can not surpass the revocable threshold. 通过对何新华等人基于离散对数困难问题的无废除门限的公钥叛逆者追踪方案的分析,发现该方案实际上仍受到废除门限的限制,也就是被撤消的用户数仍不能超过废除门限。
- An improved traitor tracing scheme based on modified RSA is proposed, which solves the existing scheme's problem of fixed session key by introducing a random number with its security improved. 摘要提出了一种改进的叛逆者追踪方案,通过引入一个随机数解决了现有方案中存在的会话密钥固定不变的问题,使其安全性得到了提高。
- An improved dynamic traitor tracing scheme 一种改进的动态叛徒追踪方案
- Traitor Tracing Scheme Based on NTRU 基于NTRU加密系统的叛逆者追踪方案
- Research of Traitor Tracing Scheme 叛逆者追踪方案研究
- New traitor tracing scheme based on bilinear map 新的基于双线性映射的叛逆者追踪方案
- A new traitor tracing scheme with extra properties 一种新的具有附加特性的叛逆者追踪方案
- Wang Qing-long et al proposed a complete asymmetric public-key traitor tracing scheme, which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. 王青龙等人还提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。
- An efficient asymmetric dynamic public-key traitor tracing scheme 一种高效非对称的动态公钥叛逆者追踪方案
- Traitor tracing schemes play an important role in tracing and identifying the traitors in conspiracy and replay attack. 叛徒追踪方案是在共谋密钥攻击和重放攻击中追踪及识别叛徒的有效措施。
- A New Traitor Tracing Scheme on Large Integer Factoring Problem 一种新的基于大整数分解困难问题的叛逆者追踪方案
- A discrete logarithm-based Traitor Tracing Scheme With Public-Key 一个基于离散对数的公钥追踪体制
- A Collusion-resistant Asymmetric Public-key Traitor Tracing Scheme 一种抗共谋的非对称公钥叛逆者追踪方案
- A Complete Asymmetric Public-Key Traitor Tracing Scheme 一种完整的非对称公钥叛逆者追踪方案
- A no Revocable Threshold Public Key Traitor Tracing Scheme 一种无废除门限的公钥叛逆者追踪方案