Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
The FEAL-8 Cryptosystem and a Call for Attack
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Collect and broadcast news in security
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A process schedule analyzing model based on grid environment
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hi-index | 0.00 |
Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. In this study, we propose the safe treatment of the certificate of authorization in this article. Both of the owner and grantee keep the certificate of authorization. We insert the watermark in the certificate of authorization to be one file. We set encryption data table and use it to encrypt the file with different key to produce the files of cipher text. Both of the owner and grantee keep their files. We create certificate information database in supervisor grid node. When both sides want to confirm, we use their keys stored in supervisor grid node to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The steps that the certificate of authorization is encrypted and decrypted will be safer.