• Citations Per Year
Learn More
Risk assessment of information security is an important assessment method in the process of detecting potential threats and vulnerabilities. Select methods of risk assessment based on the requirements and the security level of organizational or enterprise information system. The general assessment methods simply calculate the risk value, In this paper, we(More)
  • Chaoju Hu, Na Xu
  • 2008 International Conference on Computer Science…
  • 2008
This paper introduces definitions and constructions of public key infrastructure, certification authority and XTR public key system, describes the principle of digital signature of XTR-Nyberg-Rueppel signatures, and then designs a certificate authority system by using this kind of signature in order to save the time and space both in communication and(More)
  • 1