Skip to main content

and
  1. No Access

    Article

    Homomorphism key agreement based on RSA

    This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphic encryption scheme...

    **ang Guangli, Zhu **, Zhang Junhong in Wuhan University Journal of Natural Scienc… (2006)

  2. No Access

    Article

    A method of homomorphic encryption

    The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined—Similar Modu...

    **ang Guang-li, Chen **n-meng, Zhu ** in Wuhan University Journal of Natural Scienc… (2006)

  3. No Access

    Article

    Inferring requirement goals from model implemented in UML

    UML is used widely in many software development processes. However, it does not make explicit requirement goals. Here is a method tending to establish the semantic relationship between requirements goals and U...

    Tang Sheng-qun, Liu Wei, Ma Jie in Wuhan University Journal of Natural Scienc… (2001)