Zhou et al give an attack on Harns modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The p
Current distributed parallel file systems and database systems can not satisfy the demands of data-intensive applications, such as storage capacity, access perf
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to