Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through...
Saved in:
Main Authors: | Ismail, S. A., Ngadi, M. A., Sharif, J. M., Kama, M. N. |
---|---|
Format: | Article |
Published: |
American Scientific Publishers
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/75278/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
by: Ismail, Saiful Adli, et al.
Published: (2015) -
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit
by: Ismail, S. A., et al.
Published: (2015) -
RSA authentication mechanisms in control grid computing environment using gridsim toolkit
by: Ismail, Saiful Adli, et al.
Published: (2015) -
Noise sources extraction for conducted emission modeling of IC’s using IBIS models
by: Baba, Tamana, et al.
Published: (2021) -
Signal integrity analysis and noise source extraction of integrated circuits using IBIS models
by: Baba, Tamana, et al.
Published: (2021)