期刊文献+

针对无硬件安全的终端版权保护的安全设计

下载PDF
导出
摘要 随着智能终端和移动网络的迅猛发展,智能终端进入了大众的生活,各类视频应用也得到了广泛应用,但是针对这类无法提供硬件安全的移动设备的版权保护也成为一个日益严重的问题,本文将从密码算法及应用模式等方面设计一种适用于无硬件安全的智能终端实现版权保护的安全解决方案.
作者 赵云辉
出处 《广播电视信息》 2019年第S01期16-19,共4页 Radio & Television Information
基金 “互联网+环境中基于国产密码的多媒体版权保护与监管技术”项目资助,项目编号2018YFB0803700 (课题四:2018YFB0803704)。
  • 相关文献

参考文献1

二级参考文献11

  • 1YANG Muxiang,HONG Fan,LI Jun.Secure threshold order-specified multi-signature scheme in MANET[C]//Proceedings of 2006 International Conference on Computational Intelligence and Security.Washington,D.C.,USA:IEEE Xplorer,2006:1279-1282.
  • 2ABOUD S J.An efficient digital multisignature scheme[C]// Proceedings of the 2nd Information and Communication Technologies.Piscataway,N.J.,USA:IEEE Press,2006:3298-3303.
  • 3YOON E J,YOO K Y.Cryptanalysis of two multisignature schemes with distinguished signing authorities[C]//Proceedings of International Conference on Hybrid Information Technology.Washington,D.C.,USA:IEEE,2006:492-495.
  • 4CAO Feng,CAO Zhenfu.Cryptanalysis on a proxy multi-signature scheme[C]//Proceedings of the 1st International MultiSymposiums on Computer and Computational Sciences.Washington,D.C.,USA:IEEE,2006:117-120.
  • 5XU Chunxiang,ZHOU Junhui,XIAO Guozhen.A multisignature scheme for the general access structure[C]//Proceedings of 2005 International Conference on Communications,Circuits and Systems.Washington,D.C.,USA:IEEE,2005:88-90.
  • 6CHAKRABARTI S,CHANDRASEKHAR S,SINGHAL M,et al.Authenticating feedback in multicast applications using a novel multisignature scheme based on cubic LFSR sequences[C]//Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops.Washington,D.C.,USA:IEEE,2007:607-613.
  • 7VAN DER MERWE J.DAWOUD D S,MCDONALD S.A fully distributed proactively secure threshold-multisignature scheme[J].IEEE Transactions on Parallel and Distributed Systems,2007,18(4):562-575.
  • 8LI Guowen,YU Jia,LI Rupeng,et al.Two threshold multisignature Schemes from Bilinear Pairings[C]//Proceedings of 2007 International Conference on Multimedia and Ubiquitous Engineering.Washington,D.C.,USA:IEEE,2007:1041-1045.
  • 9LEE B,KIM K.Self-certified signature[J].Lecture Notes in Computer Science,2002,2551:199-214.
  • 10RAJALAKSHMI S,SRIVATSA S K.Identity based encryption using mRSA in electronic transactions[J].Information Technology Journal,2007,6(3):435-440.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部