Learn More
Impossible differential cryptanalysis is a method recovering secret key by getting rid of the keys that satisfy impossible differential relations. This cryptanalysis has been used to attack AES and many good results were gotten. For the new block cipher ARIA is similar to AES in structure, it is necessary to research its security against impossible(More)
Workflow Management System is used for supporting many day-to-day workflows in large organizations. But heterogeneous and distributed computing systems make security management of WFMS decentralized, thus its security must be noticed. In this paper, we propose a role-based secure workflow model which realizes the principle of separation of duties (SoD), the(More)
  • 1