A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A dynamic supervising model based on grid environment
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Hi-index | 0.00 |
Grid computing architecture was defined to be a complete physical layer. The data transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. User sends user-id and password to supervisor node, then supervisor node sends to authority node to certificate. Supervisor receives message from authority node and return to user node. When these algorithms install in all grid nodes, we can keep authentication process be secure in all system.