Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
The FEAL-8 Cryptosystem and a Call for Attack
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A dynamic supervising model based on grid environment
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A process schedule analyzing model based on grid environment
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hi-index | 0.00 |
We propose the encryption and decryption algorithm to produce authenticator. In local execute grid node, we use this authenticator to build user information data base and do authentication application. In supervisor grid node, we use the authenticator to build remote user information data base and do authentication application. When these algorithms install in all grid nodes, we can run authentication in all system more secure and effective.