A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Fundamentals of Computer Security
Fundamentals of Computer Security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
The FEAL-8 Cryptosystem and a Call for Attack
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Analysis of Algorithm of Cipher Text Containing Data and Key in Network Security
ICICIC '07 Proceedings of the Second International Conference on Innovative Computing, Informatio and Control
Processing certificate of authorization with watermark based on grid environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Hi-index | 0.00 |
The data must keep security in the computer system. We collect all data (news) and broadcast them to all users. We avoid the data to be modified by attacker and broadcast the wrong message. We propose the method to collect the news and store them in computer system in security. We encrypt the news and store the encrypted news in the encrypted news database. We set encryption data table and use it to encrypt the news file to encrypted news data. The news has different location code in the news information database. We use location code to insert encryption data table to encrypted news and store the encrypted news to encrypted news database. We create the broadcast list table to broad the order of news. When we want to broadcast, we decrypt the encrypted news first and then show out. We use this location code of news in the news information database to get encryption data table in the encrypted news. We use encryption data table to do decryption. When we install these algorithms in the computer system to process, it is securer.