[PDF][PDF] A novel encryption method with its application in the copyright protection of digital data

MA Jian-feng, C Teechye, KC Alex - Journal of Software, 2002 - jos.org.cn
encryption system in the copyright protection of digital data. Conclusions are given in …
research areas include information security, channel coding, fault tolerant computing, and network

[PDF][PDF] Editable blockchain: models, techniques and methods

Y Yong, W Fei-Yue - Acta Automatica Sinica, 2020 - aas.net.cn
… but controversial topic in blockchain research, aiming at editing the … the detailed models,
techniques and methods in redacting, … research and development in this novel area. Key words …

[引用][C] Intrusion detection system (IDS): case study

AS Ashoor, S Gore - International Conference on Advanced Materials …, 2011

数字城市中分布式数据库安全机制技术研究

蔡政 - 2016 - ir.lzu.edu.cn
network environment, spatial database encryption technology and other technical aspects
of research, and finally, summarize preliminary theoretical research results, based on the …

[引用][C] Fully privacy-preserving determination of point-range relationship

Z Chen, S Li, L Chen, Q Huang, W Zhang - Scientia Sinica Informationis, 2018

[PDF][PDF] 一种秘密共享新个体加入协议

董攀, 况晓辉, 卢锡城 - 软件学报, 2005 - jos.org.cn
… His research areas are computer network and super … A secret sharing system can protect
the secret against being lost, … perform encryption for three times: its holder’s encryption, …

[PDF][PDF] 传感器网络安全研究

李平, 林亚平, 曾玮妮 - 软件学报, 2006 - jos.org.cn
… on securing every individual in the network. Based on the available security primitives supported
by current cryptography research, … of security mechanisms in network environment. The …

[引用][C] Self-certified key exchange scheme based on hybrid mode problems

PC Su, CH Tsai - Journal of Chung Cheng Institute of Technology, 2010

基于多规则下自然语言文本隐写的研究

吴宁 - 2020 - ir.lzu.edu.cn
encryption technology, steganography can protect important … In the research, we highlight
the role of transition probability … propose three different steganography methods based on this …

[引用][C] Wrapper-based digital rights management mechanism

CL Lin - Shih Hsin University, Taipei, Taiwan, 2006