With the rapid and steady development of network and software technology,how to protect the copyright of software has become a thorny problem.In this paper,the author presents a registry-code construction algorithm used for identity authentication.The nec
参考文献
相似文献
引证文献
引用本文
何希平.实现自相关验证的通用注册码构建算法[J].重庆工商大学学报(自然科学版),2005,(5): HE Xi-ping. Universal algorithm for registry- code construction with self- dependence validation[J]. Journal of Chongqing Technology and Business University(Natural Science Edition),2005,(5):