搜索资源列表
Asmuth_Bloom
- Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.-Secret sharing consists of recovering a secret S from a set of shares, each c
inter-domain-test
- Xen 域间通信的访问控制的例子,主要用于TPM的域间密钥共享协同。在Xen/Linux上实现的一个原型系统。-In this thsis, we introduce a TPM based trust scheme and secure protocol for VM, and develop a prototype system of the secure protocol for Xen/Linux virtualization system. The trust scheme can p
Mercal-Hellman-scheme
- The implementation of an encryption algorithm Mercal-Hellman.
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies