搜索结果: 1-6 共查到“军事学 Rights”相关记录6条 . 查询时间(0.062 秒)
Defending Democracy and Human Rights in the Western Hemisphere
Defending Democracy Human Rights e Western Hemisphere
2019/10/10
One glimpse at the covers of the main news and political magazines in recent years is often enough to discern a common theme. These publications often display fatalist titles such as “Democracy in Dem...
A New Digital Rights Management Solution Based on White-Box Cryptography
digital rights management white-box cryptography
2017/10/16
Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application execute...
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Proxy Signcryption Identity-Based Cryptography Network Security
2009/6/2
In this paper, a new identity-based proxy signcryption
scheme is presented. The proposed scheme allows partial delegation
of signing rights. Consequently, a signature created by the proxy
signer is...
Anonymous Consecutive Delegation of Signing Rights:Unifying Group and Proxy Signatures
Anonymous Consecutive Delegation Signing Rights Unifying Group Proxy Signatures
2009/6/2
We define a general model for consecutive delegations of signing rights with the following
properties: The delegatee actually signing and all intermediate delegators remain anonymous.
As for group s...
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Cryptology and Physical Security Rights Amplification Master-Keyed Mechanical Locks
2009/4/15
This paper examines mechanical lock security from the perspective of computer science and cryptology.
We focus on new and practical attacks for amplifying rights in mechanical pin tumbler locks. Give...
Secure Proxy Signature Schemes for Delegation of Signing Rights
Digital signatures proxy signatures aggregate signatures
2009/4/9
A proxy signature scheme permits an entity to delegate its signing rights to another. These schemes have
been suggested for use in numerous applications, particularly in distributed computing. Before...