traitor tracing造句怎么写
- 造句
- 关注:2.61W次
Ma Hua et al's traitor tracing scheme based on RSA is analyzed, an obvious bug in which is found, and the problem is solved by introducing a random number.
Efficient traitor tracing scheme based on single cycle T-function
Collusion-resistant asymmetric public key traitor tracing scheme
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
- 文章版权属于文章作者所有,转载请注明 https://zhongwengu.com/zh-my/sentence/9gy7o4.html