Search Results - parallel information security algorithm*
Search alternatives:
- parallel information »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
2
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
Get full text
Get full text
Conference or Workshop Item -
3
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
Get full text
Get full text
Get full text
Article -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
5
-
6
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
7
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
Get full text
Get full text
Get full text
Article -
8
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
9
Algorithm Design of Digital Watermarking Scheme for Multi-frames Medical Images
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to its deterministic nature and its sensitivity to initial conditions, chaos has a certain potential in creating a newway of securing information to be transmitted or stored. …”
Get full text
Get full text
Final Year Project -
11
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
Get full text
Get full text
Article -
12
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
15
-
16
