Search Results - (( using identification rsa algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- using identification »
- application stemming »
- identification rsa »
- stemming algorithm »
- java application »
- rsa algorithm »
-
1
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
