A broadcast encryption scheme using hierarchical identity - based encryption 一种基于身份分层结构加密算法的广播加密方案
An image encryption scheme based on generalized synchronization theorem for discrete chaos system 基于离散混沌系统广义同步定理的数字图像加密方案
In addition , the grid application must handle both symmetric and asymmetric encryption schemes 此外,网格应用程序必须处理对称及非对称的加密方案。
Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family ( cff ) 我的翻译是:基于多项式和“ cff ”的绝对安全的非对称性加密方案。
This option is useful if the web site stores passwords using a non - reversible encryption scheme such as hashing 如果网站使用不可还原的加密方案(如哈希)存储密码,则该选项非常有用。
Similarly , the encryption and validation keys and the encryption scheme used for cookie data must be exactly the same 同样,用于cookie数据的加密和验证密钥以及加密方案也必须完全相同。
Secondly , this paper put forward an encryption scheme which combining the strongpoint of two algorithms 然后,本文提出了一种综合idea和rsa的优点,同时又避免了它们各自不足的加密方案。
16 bellare m , desai a , pointcheval d , rogaway p . relations among notations of security for public key encryption schemes 因此,有必要在基于身份的环境中设计出安全且高效的多解密者短密文加密方案。
Developers may want to include a computer security expert as part of the design team for implementing an enterprise encryption scheme 开发人员在实现企业加密计划时,设计小组中需要包括计算机安全专家。
This paper proposes a new public - key encryption scheme which removes one element from the public - key tuple of the original cramer - shoup scheme 这里的标准模型指的是不利用随机预言机这一工具来论证体制安全性的模型。