The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why?
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why?
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why 84 pp. Englisch. N° de réf. du vendeur 9783659252792
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution,. N° de réf. du vendeur 5143247
Quantité disponible : Plus de 20 disponibles
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 84 pages. 8.66x5.91x0.19 inches. In Stock. N° de réf. du vendeur 3659252794
Quantité disponible : 1 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 84 pp. Englisch. N° de réf. du vendeur 9783659252792
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why. N° de réf. du vendeur 9783659252792
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. A Comparative Evaluation of Cryptographic Algorithms | The comparison of Encryption Algorithms | Ravinder Singh Mann | Taschenbuch | 84 S. | Englisch | 2012 | LAP LAMBERT Academic Publishing | EAN 9783659252792 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 106237940
Quantité disponible : 5 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
paperback. Etat : New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA82936592527946
Quantité disponible : 1 disponible(s)