Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Artikel-Nr. 505012057
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Englisch. Artikel-Nr. 9786204197586
Anzahl: 2 verfügbar