An Analysis Of Key Generation Efficiency Of Rsa Cryptos Ystem In Distributed Environments


Download An Analysis Of Key Generation Efficiency Of Rsa Cryptos Ystem In Distributed Environments PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get An Analysis Of Key Generation Efficiency Of Rsa Cryptos Ystem In Distributed Environments book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Proceedings of ICETIT 2019


Proceedings of ICETIT 2019

Author: Pradeep Kumar Singh

language: en

Publisher: Springer Nature

Release Date: 2019-09-23


DOWNLOAD





This book presents high-quality, original contributions (both theoretical and experimental) on Information Security, Machine Learning, Data Mining and Internet of Things (IoT). It gathers papers presented at ICETIT 2019, the 1st International Conference on Emerging Trends in Information Technology, which was held in Delhi, India, in June 2019. This conference series represents a targeted response to the growing need for research that reports on and assesses the practical implications of IoT and network technologies, AI and machine learning, data analytics and cloud computing, security and privacy, and next generation computing technologies.

An Analysis of Key Generation Efficiency of Rsa Cryptos Ystem in Distributed Environments


An Analysis of Key Generation Efficiency of Rsa Cryptos Ystem in Distributed Environments

Author: Gökhan Çağrıcı

language: en

Publisher:

Release Date: 2005


DOWNLOAD





As the size of the communication through networks and especially through Internet grew, there became a huge need for securing these connections. The symmetric and asymmetric cryptosystems formed a good complementary approach for providing this security. While the asymmetric cryptosystems were a perfect solution for the distribution of the keys used by the communicating parties, they were very slow for the actual encryption and decryption of the data flowing between them. Therefore, the symmetric cryptosystems perfectly filled this space and were used for the encryption and decryption process once the session keys had been exchanged securely. Parallelism is a hot research topic area in many different fields and being used to deal with problems whose solutions take a considerable amount of time. Cryptography is no exception and, computer scientists have discovered that parallelism could certainly be used for making the algorithms for asymmetric cryptosystems go faster and the experimental results have shown a good promise so far. This thesis is based on the parallelization of a famous public-key algorithm, namely RSA.

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments


Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Author: Issa Traore

language: en

Publisher: Springer

Release Date: 2018-11-21


DOWNLOAD





This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018. The 10 full papers were carefully reviewed and selected from 28 submissions. This book also contains the abstracts of two keynote talks and one tutorial. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.