您要查找的是不是:
- A publicly verifiable encryption scheme allows any entity to verify that a cipher-text hides the same message as committed before without revealing it. 可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。
- verifiable encryption scheme 可验证加密机制
- The online/offline encryption scheme is a solution to increase encryption speed. 在线/离线加密方案旨在提高在线加密速度。
- The homomorphism key agreement based on IBE and homomorphic encryption scheme is presented. 该协议建立的会话密钥是等献的、前向保密的。
- Then identity-based binary tree encryption scheme is constructed.As a result, a concrete IBE-NIKU is given. 基于已有的二叉树加密构造了基于身份的二叉树加密方案及非交互式密钥更新的基于身份加密方案;
- WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP是一种加密方案的基础上的RC - 4加密,即对所有802.;11a,b和g无线的产品。
- Broadcast encryption scheme is a widely used cryptosystem for a group of receivers. 摘要 广播加密是一种应用广泛的群组保密通信系统。
- An authenticated encryption scheme based on self certified of public key from bilinear pairings is proposed. 提出了一种基于双线性对和公钥自证明的认证加密方案。
- Improvement of Publicly Verifiable Authenticated Encryption Scheme 改进的公开验证认证加密方案
- Similarly, the encryption and validation keys and the encryption scheme and validation scheme used for cookie data must be exactly the same. 同样,用于Cookie数据的加密和验证密钥以及加密方案和验证方案也必须完全相同。
- Based on the elliptic curve cryptosystem, this paper proposes an authenticated encryption scheme with message recovery and message linkage recovery. 分别提出了基于椭圆曲线的具有消息恢复和消息链接恢复的认证加密方案。
- As expected, you need to use the same encryption scheme on all devices on your network for communication to be successful. 可以想到,你对你所有的网络服务需要用同样的加密方法来使你的通讯能成功进行。
- In this paper, generalized Knight's Tour Problem (KTP) is combined with video encryption, and a novel video encryption scheme is proposed. 摘要将广义骑士巡游与视频加密相结合,提出了一种新的视频加密方案。
- To improve the security features of chaotic communication system,a chaotic encryption scheme was developed based on piecewise parabolic map,and composite sequence was used. 为提高混沌通信系统的安全性能,在分段抛物映射基础上提出一种利用复合序列的混沌加密方案。
- According to the MOV reduction theory,the identity-based encryption scheme which is based on the bilinear map will lose the high efficiency of elliptic curve. 根据MOV归约理论,采用双线性映射构造的基于身份加密方案使得该方案不具有椭圆曲线高效的优点。
- As compared to Hsu and Wu ’s authenticated encryption scheme with(t,n)shared verification,the proposed scheme has the following advantages:it is more efficient for signature generation and encryption; it can detect malicious verifiers cheating others. 该方案与Hsu和wu提出的具有门限共享验证的认证加密方案相比,签名加密效率更高,可以检测恶意的接收组成员。
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family( CFF). 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。
- New verifiable encryptions and their applications 新的可验证加密方案及其应用
- An Identity-based verifiably encrypted signature scheme using bilinear pairings on ellipse curve was constructed, and a new fair multi-party exchange protocol was designed. 利用椭圆曲线上的双线性对构造基于身份的可验证加密签名方案,基于这种签名方案构建了一种新的多方公平交换协议。
- In addition, the grid application must handle both symmetric and asymmetric encryption schemes. 此外,网格应用程序必须处理对称及非对称的加密方案。