There are two common types of protection methods: ownership verification and usage authorization. In this paper, we propose Non-Transferable ...
確定! 回上一頁