However, database encryption has a relatively high technical threshold for the majority of users, and even information security practitioners are more mysterious.
但是数据库加密具有相对较高的技术门槛,对于广大用户、甚至是信息安全从业人员来说都比较神秘。
Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.
基于代理签名与可转换认证加密方案,任等(2005)提出了一种代理可转换认证加密和门限代理签名方案。
Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.
基于代理签名与可转换认证加密方案,任等(2005)提出了一种代理可转换认证加密和门限代理签名方案。
应用推荐