Language: English
Published by Lap Lambert Academic Publishing, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 84 pages. 8.66x5.91x0.19 inches. In Stock.
Language: English
Published by LAP LAMBERT Academic Publishing Sep 2012, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why Books on Demand GmbH, Überseering 33, 22297 Hamburg 84 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: Mispah books, Redhill, SURRE, United Kingdom
paperback. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Language: English
Published by LAP LAMBERT Academic Publishing Sep 2012, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why 84 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution,.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659252794 ISBN 13: 9783659252792
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information security. The security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by the party that possesses the associated key. These algorithms consume a significant amount of time and have a significant value of complexity .The comparison is performed based upon the experiments performed using NS2 simulator by taking two different parameters i.e. (i) computation time ii) complexity. Encryption algorithms are categorized into Symmetric key (private) and Asymmetric (public) key.RSA is a commonly adopted public key cryptography algorithm. This book covers comparative analysis of these algorithms and brings us on conclusion as to which algorithm is more efficient and why.