• 设计两种叛逆者追踪方案

    Design two traitor tracing schemes.

    youdao

  • 对已有叛逆者追踪方案性能进行了分析总结

    Analyze and summarize the performance of the presented traitor tracing schemes in detail.

    youdao

  • 基于纠错叛逆者追踪模型通过纠错来构造的。

    ECC - based traitor tracing scheme is constructed with an error correcting code.

    youdao

  • 利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案

    By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    youdao

  • 叛逆者追踪一种可以追踪广播加密算法,也属于数字指纹范畴

    Traitor tracing is a kind of broadcast with traceability, which falls into the category of fingerprinting.

    youdao

  • 利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案

    Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.

    youdao

  • 实际通常是把叛逆者追踪方案广播加密方案有效地结合起来使盗版造成损失最小化。

    In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.

    youdao

  • 本文中,笔者着重研究如何利用现代密码技术构造叛逆者追踪方案数字版权保护方案。

    In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.

    youdao

  • 为了解决数字版权保护中的用户密钥泄漏问题提出了一种基于线性映射叛逆者追踪方案

    A new efficient traitor tracing scheme using bilinear mapping is presented in order to solve the user-key leaking problem in digital right management.

    youdao

  • 为了解决数字版权保护中的用户密钥泄漏问题,提出了一种基于双线性映射叛逆者追踪方案

    Based on digital watermarking and applied cryptology, an authentication scheme for copyright protection of digital product is proposed.

    youdao

  • 基于非对称公钥叛逆者追踪方案给出了新的电子软件销售产权保护模型,适用于一类需要安装运行的软件。

    A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.

    youdao

  • 同时利用叛逆者追踪方案构造出签发电子证书软件安装方案,从而给出了有效数字版权保护方案。

    At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.

    youdao

  • 摘 要一些共谋者试图构造盗版解码器获取数据内容非法访问的时候,叛逆者追踪模型可以用来发现至少其中的叛逆者

    Absrtact: Traitor tracing schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to content.

    youdao

  • 发生盗版时,数据发行商不但可以追踪叛逆者而且可以通过更新用户向量来废除叛逆者密钥解密能力

    When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.

    youdao

  • 利用方案可以准确地追踪所有叛逆者

    This scheme can accurately determine a or all traitor (s).

    youdao

  • 利用方案可以准确地追踪所有叛逆者

    This scheme can accurately determine a or all traitor (s).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定