Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Bestandsnummer des Verkäufers 505012057
Anzahl: Mehr als 20 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too. 68 pp. Englisch. Bestandsnummer des Verkäufers 9786204197586
Anzahl: 2 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Englisch. Bestandsnummer des Verkäufers 9786204197586
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too. Bestandsnummer des Verkäufers 9786204197586
Anzahl: 1 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND. Bestandsnummer des Verkäufers 18396035399
Anzahl: 4 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. Bestandsnummer des Verkäufers 26396035405
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand. Bestandsnummer des Verkäufers 401390226
Anzahl: 4 verfügbar