traitor tracing
基本解釋
- 叛逆者追蹤
英漢例句
- In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
在實(shí)際中通常是把叛逆者追蹤方案和廣播加密方案有效地結(jié)合起來使盜版造成的損失最小化。 - At the same time, using the traitor tracing scheme, it constructs a kind of signing electronic license and software installation scheme which gives an efficient digital copyright protection scheme.
同時(shí),利用此叛逆者追蹤方案,構(gòu)造出一種簽發(fā)電子證書和軟件安裝方案,從而給出了一種有效的數(shù)字版權(quán)保護(hù)方案。 - In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.
在本文中,筆者著重研究如何利用現(xiàn)代密碼技術(shù)來構(gòu)造叛逆者追蹤方案和數(shù)字版權(quán)保護(hù)方案。
雙語例句
詞組短語
- traitor tracing scheme 追蹤體制
- asymmetric traitor tracing 非對(duì)稱叛逆者追蹤
- Research on Traitor Tracing 叛逆者追蹤研究
- tracing traitor 叛逆跟蹤
短語
專業(yè)釋義
- 叛徒追蹤
In this paper, we will research the tracing algorithm, key scheme and performance of the above traitor tracing schemes in depth.
本文從算法設(shè)計(jì)、密鑰方案和算法性能等方面研究與分析上述叛徒追蹤方案,主要的工作成果是: 1.詳細(xì)介紹了對(duì)抗共謀密鑰攻擊的兩類叛徒追蹤方案:對(duì)稱叛徒追蹤方案和非對(duì)稱叛徒追蹤方案,并且深入的分析了它們各自的性能。 - 叛逆者追蹤
- 盜版追蹤
The detection of watermarks need no original database, thus realizes the blind-detection.3) Research on outsourced database traitor tracing based on digital fingerprint.
3)基于數(shù)字指紋的外包數(shù)據(jù)庫盜版追蹤技術(shù)的研究。 - 叛徒追蹤
- 叛逆者追蹤