Reference Citations - HerongYang.com - v2.94, by Herong Yang
Distributed Key System Broken Up Over Multiple Nodes
'Cryptography Tutorials – Herong’s Tutorial Examples' tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.
The Cryptography Tutorials – Herong’s Tutorial Examples tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.
Subject: Can A Distributed Key System Broken Up Over Multiple Nodes Provide Greater Security Robustness While Meeting System Performance Requirements Date: May 26, 2013 Author: James Redman et al. Source: http://micsymposium.org/mics_2013_Proceedings/submissions /mics20130_submission_34.pdf Abstract The need for increased network security has never been greater, with a new high profile security breach seemingly occurring on a weekly basis. Encryption can be a valuable tool in increasing network security, however, its weakness often resides in the vulnerability of the cryptographic key. If a given node in a network contains the whole key and it is compromised, then the network’s security is breached. Also, if the key is destroyed then all the information it protects could be lost. In this paper we look at the option of breaking the key up over multiple nodes, in this case six, while only three nodes are necessary to replicate the key and unlock the lock. This hopefully creates greater security while also providing a greater level of fault tolerance by allowing retrieval of the entire key even if three of the nodes are compromised. ... References [1] M. Abdalla, et al., “Robust Encryption,” Cryptology ePrint Archive, Report 2008/440; http://eprint.iacr.org/2008/440.pdf. [2] T. Ylonen and C. Lonvick, The Secure Shell (SSH) Authentication Protocol, IETF RFC 4252, January 2006; http://tools.ietf.org/html/rfc4252. [3] Y. Herong. (2013). Cryptography Tutorials – Herong’s Tutorial Examples. [Online]. Available: https://www.herongyang.com/Cryptography/. ...
Table of Contents
(Android) Getting Current Date and Time
Deatil View with other language
Web-palveluiden koostaminen: web- ja RESTful-palvelut
Corso di Architetture Orientate ai Servizi
Hardening a SAS Installation on a multi tier installation on Linux
[scala-user] for-loops still not optimized in 2.10?
.bin/.cue - the purpose of .cue?
(horror movie) com.hellogood.eCalendar
Using keytool to convert bks file to p12
Error while using LWP::Socket to send XML Data
►Distributed Key System Broken Up Over Multiple Nodes
Cant receive MMS with wifi turned on
Including and using the MySql.Data.dll on your web host server
Distributed Key Systems: Enhancing Security...
WP Spreadplugin Basket not shown
How do you get multiple resultset from a single CallableStatement?
Blowfish Cipher Algorithm in Java