{"title":"密码学在防盗中的应用与研究","authors":"Yan-Sheng Yao","doi":"10.1109/ICIA.2004.1373421","DOIUrl":null,"url":null,"abstract":"This paper introduces the history, classes and characters of cryptography and indicates the necessity of guard against code theft. In order to protect just identity and secret information, a new kind of cryptography and its application and advantages has been given and analyzed. To develop a better character of guard against theft, the operator must rightly use fixed first code with validation code which is decided by algorithm of each time to pass identity verification. The paper illuminates the theory of software control, puts forward a novel secure cryptography that has not been found before.","PeriodicalId":297178,"journal":{"name":"International Conference on Information Acquisition, 2004. Proceedings.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Application and research on cryptography of guard against theft\",\"authors\":\"Yan-Sheng Yao\",\"doi\":\"10.1109/ICIA.2004.1373421\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces the history, classes and characters of cryptography and indicates the necessity of guard against code theft. In order to protect just identity and secret information, a new kind of cryptography and its application and advantages has been given and analyzed. To develop a better character of guard against theft, the operator must rightly use fixed first code with validation code which is decided by algorithm of each time to pass identity verification. The paper illuminates the theory of software control, puts forward a novel secure cryptography that has not been found before.\",\"PeriodicalId\":297178,\"journal\":{\"name\":\"International Conference on Information Acquisition, 2004. Proceedings.\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Acquisition, 2004. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIA.2004.1373421\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Acquisition, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIA.2004.1373421","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application and research on cryptography of guard against theft
This paper introduces the history, classes and characters of cryptography and indicates the necessity of guard against code theft. In order to protect just identity and secret information, a new kind of cryptography and its application and advantages has been given and analyzed. To develop a better character of guard against theft, the operator must rightly use fixed first code with validation code which is decided by algorithm of each time to pass identity verification. The paper illuminates the theory of software control, puts forward a novel secure cryptography that has not been found before.