Войдите в свой аккаунт
Вы сможете копить купоны, сохранять любимые товары и оставлять отзывы

Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad "Evolutionary Computing Based Cryptographic Key Management"

Нет отзывов
Характеристики
Закрытая распродажа

Характеристики

ISBN
9783659282898
Автор
Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad
Язык
английский
Год издания
2012
Количество страниц
148 шт.
Аннотация
The PKI has provided a strong platform for the RSA algorithm. In view to overcome limitations in this book a cryptographic method of key management has been proposed that uses the symmetric key algorithm over the asymmetric key algorithm. The symmetric key algorithms do not have any key management scheme. Further, the proposed work uses ant colony based evolutionary computing algorithm to meet the requirement in which the shared secret value changes dynamically with time and matures with the time as numbers of communications among the legitimate users increases. The method proposed has been found have system of key management, which apart from being faster has all the security features. The efficiency in time management in all the aspects namely Key Generation, key Transmission, Key Revocation, Encryption and decryption is found to be much better than the widely used PKI. This speed do not compromise the security aspects of the system, in fact this efficient time management.
Дополнительная информация
A New Approach
Все характеристики

Характеристики

Общие характеристики

ISBN
9783659282898
Автор
Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad
Язык
английский
Год издания
2012
Количество страниц
148 шт.
Аннотация
The PKI has provided a strong platform for the RSA algorithm. In view to overcome limitations in this book a cryptographic method of key management has been proposed that uses the symmetric key algorithm over the asymmetric key algorithm. The symmetric key algorithms do not have any key management scheme. Further, the proposed work uses ant colony based evolutionary computing algorithm to meet the requirement in which the shared secret value changes dynamically with time and matures with the time as numbers of communications among the legitimate users increases. The method proposed has been found have system of key management, which apart from being faster has all the security features. The efficiency in time management in all the aspects namely Key Generation, key Transmission, Key Revocation, Encryption and decryption is found to be much better than the widely used PKI. This speed do not compromise the security aspects of the system, in fact this efficient time management.
Дополнительная информация
A New Approach
Пожаловаться на товар или описание
Пожаловаться на товар или описание

Возрастное ограничение

Аватар

Информация о технических характеристиках, комплекте поставки, стране изготовления и внешнем виде товара носит справочный характер.

Давайте знакомиться