The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why?
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
O autor é bacharel em tecnologia, mestre em tecnologia. Doutoramento em ciências e engenharia informática. O autor tem mais de dez anos de experiência. Já tem três publicações na LAP LAMBERT Academic Publishing.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why 84 pp. Englisch. Bestandsnummer des Verkäufers 9783659252792
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution,. Bestandsnummer des Verkäufers 5143247
Anzahl: Mehr als 20 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 84 pages. 8.66x5.91x0.19 inches. In Stock. Bestandsnummer des Verkäufers 3659252794
Anzahl: 1 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why Books on Demand GmbH, Überseering 33, 22297 Hamburg 84 pp. Englisch. Bestandsnummer des Verkäufers 9783659252792
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why. Bestandsnummer des Verkäufers 9783659252792
Anzahl: 1 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. A Comparative Evaluation of Cryptographic Algorithms | The comparison of Encryption Algorithms | Ravinder Singh Mann | Taschenbuch | 84 S. | Englisch | 2012 | LAP LAMBERT Academic Publishing | EAN 9783659252792 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Bestandsnummer des Verkäufers 106237940
Anzahl: 5 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
paperback. Zustand: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Bestandsnummer des Verkäufers ERICA82936592527946
Anzahl: 1 verfügbar