期刊文献+

境外数字版权保护技术研究现状可视化分析 被引量:2

Visual Analysis on Overseas DRM Technology
下载PDF
导出
摘要 为系统、全面地掌握数字版权保护技术研究现状,以1945—2011年SCI为数据源,借助CiteSpaceII和Excel软件对相关研究论文的时间分布、空间分布进行分析,并重点论述公钥密码技术、量子密码技术、光学加密技术三大DRM主流技术领域。 In order to follow research situation of foreign DRM technology the published articles on DRM during 1945 - 2011, which are recorded in the database of SSCI, are chosen to analyze in the paper. By applying CiteSpacelI and Excel, time distribution , space distribution are also analyzed. Meanwhile, three major technology area of DRM like public key cryptography, quantum cryptography and optical encryption technologies are analyzed.
作者 殷月红
机构地区 江苏大学图书馆
出处 《科技管理研究》 CSSCI 北大核心 2014年第6期133-137,共5页 Science and Technology Management Research
关键词 数字版权保护技术 研究现状 可视化分析 时间分布 空间分布 主题分布 DRM research situation visual analysis time distribution space distribution subject distribution.
  • 相关文献

参考文献22

  • 1刘可静,孙琴.国内外DRM技术专利发展态势及情报分析[J].图书情报工作,2008,52(12):63-66. 被引量:1
  • 2W DIFFIE, ME HELLMAN. New directions in cryptography [ J ]. IEEE Transactions on Information Theory, 1976, 22 ( 6 ) : 644 - 654.
  • 3R L RIVEST, A SHAMIR, L ADLEMAN. A method for obtaining digital signatures and public key eryptosystems [ J]. Communications of theACM, 1978, 21 (2): 120-126.
  • 4SHAFI GOLDWASSER, SILVIO MICALI. Probabilistic encryption [J]. Journal of Computer and System Sciences, 1984, 28 (2): 270 - 299.
  • 5WIESNER STEPHEN. Conjugate coding [ J]. ACM SIGACT News, 1983, 15 (1): 78-88.
  • 6C H BENNETT, G BRASSARD. Quantum cryptography: Public key distribution and coin tossing [ C ] //Bangalore India: proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984:175-179.
  • 7桂有珍,韩正甫,郭光灿.量子密码术[J].物理学进展,2002,22(4):371-382. 被引量:10
  • 8C H BENNETT. Experimental quantum cryptography [ J]. Journal ofCryptolgy, 1992 (5): 3-28.
  • 9C H BENNETT, SJ WIESNER. Communication via one- and two - particle operators on Einstein - Podolsky - Rosen states [ J]. Physical Review Letters, 1992, 69 (20): 2881-2884.
  • 10A K EKERT. Quantum cryptography based on Bell's theorem [ J. Physical Review Letters, 1991, 67 (6) : 661 -663.

二级参考文献8

  • 1美国专利检索网.[2007-12-31].http://patft, uspto, gov/ne-tahtml/PTO/search-adv, htm.
  • 2欧洲专利检索网世界范围专利申请数据库.[2007-02-01].ht-tp://ep, espacenet, conr/advancedSearch? locale = en_EP.
  • 3PCT国际专利公报数据库.[2007-12-14].http ://www. wipo.int/pctdb/en/search -struct. jsp.
  • 4韩俊.2005年信息技术领域专利态势发布报告//“武汉·中国光谷”知识产权保护论坛论文集.武汉,2005:3.
  • 5中国专利局网站的专利申请检索数据库.[2007-01-15].ht.tp://www.sipo.gov.cn/sipo/zljs/.
  • 6WIPO. Patent Report Statistics on Worldwide Patent Activity( 2007 Edition ). [ 2008-01-08 ]. http ://www. wipo. int.
  • 7WIPO. Record Year for International Patent Filings with Significant Growth from Northeast Asia. [ 2008-01-10 ]. http://www. wipo. int.
  • 8ZHANG Xiao-yu,GUO Guang-can.Quantum Cryptography Using Coherent State[J].Chinese Physics Letters,1996,13(4):277-280. 被引量:1

共引文献9

同被引文献15

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部