The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an project based on chosen-message exponent extraction against RSA hardware implementation. The intercepting of the similar characteristic curve can help make the template of the exponential matching more accuracy and more efficient In the meantime it can improve the accuracy of attack.
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in...
Trusted computing is a new generation technology of secure computing environment proposed by trusted computing group (TCG). Although many TC vendors claim that their products are compliant to TCG specifications, itpsilas very difficult to affirm it. Moreover, according to some government regulations on security, TC products shall require the official approval. Thus the testing and evaluation on TC...
Grid provides people the way to share large mount of distributed resources and services that belong to different local organizations. That is a good way to share many kinds of distributed resources via the network in the open environment, thus it makes security problems more complicate and more important for us than before. In this paper, we analyze the requirements of trusted computing in grid. Considering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.