Author:
Distefano Salvatore,Puliafito Antonio
Reference10 articles.
1. AES (2001) Federal information. processing strandard pubblication 197.
2. Blanchet C, Mollon R, Deleage G (2006) Building an encrypted file system on the egee grid: Application to protein sequence analysis. In: ARES ’06: Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society, Washington, DC, USA, pp 965–973
3. Junrang L, Zhaohui W, Jianhua Y, Mingwang X (2004) A secure model for network-attached storage on the grid. In: SCC ’04: Proceedings of the 2004 IEEE International Conference on Services Computing, IEEE Computer Society, Washington, DC, USA, pp 604–608
4. Kerckhoffs A (1883) La cryptographie militaire. Journal des sciences militaires IX:5–83
5. Rivest RL, Shamir A, Adelman LM (1978) A method for obtaning digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126