-
Article
Homomorphism key agreement based on RSA
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphic encryption scheme...
-
Article
A method of homomorphic encryption
The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined—Similar Modu...
-
Article
Inferring requirement goals from model implemented in UML
UML is used widely in many software development processes. However, it does not make explicit requirement goals. Here is a method tending to establish the semantic relationship between requirements goals and U...