Search Results - (( data replication method algorithm ) OR ( data application rsa algorithm ))
Search alternatives:
- replication method »
- method algorithm »
- data application »
- application rsa »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
5
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…This RSA co-processor core is able to encrypt and decrypt data with variable key lengths up to 4096 bits. …”
Get full text
Get full text
Thesis -
7
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
10
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
11
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
12
-
13
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
14
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. For example, RSA, DES (Data Encryption Standard), Symmetric Key Cryptography. …”
Get full text
Get full text
Research Reports -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
17
-
18
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
19
-
20
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013Get full text
Get full text
Get full text
Proceeding Paper
