High Performance Approach for Digital Signature

High Performance Approach for Digital Signature that is Called Grid Signature is applied through the separation of the message, into blocks and encrypting each block to get cipher blocks.

High Performance Approach for Digital Signature

Author: Iyad Shaheen

Publisher: LAP Lambert Academic Publishing

ISBN: 9783844326154

Page: 132

View: 862

Grid computing is one of the most powerful techniques that can achieve a high acceleration for cryptographic algorithms. This approach makes the digital signature attractive for adoption by businesses to secure their documents. In this thesis, we propose and develop an application for digital signature cryptography using enterprise grid middleware called Alchemi. High Performance Approach for Digital Signature that is Called Grid Signature is applied through the separation of the message, into blocks and encrypting each block to get cipher blocks. Inside Alchemi, it computing the hash code is used for cipher blocks in independent Alchemi executors and any result of computing hash 160 bit is added to other in exclusive disjunction logic gate; the result is called Grid Hash . The evaluation of performance in the grid signature depends on three relations: file size; block size and number of executors. For each file the sign or verify was carried on 1, 2, 3, 4 and 5 executor nodes. So the performance is reached when using file size 82MB and under running 4 executors to 137.96% of speed up over the single processor version.

High Performance Computing and Communications

... carrying out the security and performance critical operation for digital signature, ... The presented work provided an approach and proof-ofconcept ...

High Performance Computing and Communications

Author: Jack Dongarra

Publisher: Springer Science & Business Media

ISBN: 3540290311

Page: 1118

View: 561

This book constitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, HPCC 2005, held in Sorrento, Italy in September 2005. The 76 revised full papers and 44 revised short papers presented were carefully reviewed and selected from 273 submissions. The papers are organized in topical sections on network protocols, routing, and algorithms; languages and compilers for HPC; parallel and distributed system architectures; embedded systems; parallel and distributed algorithms, wireless and mobile computing, Web services and Internet computing; peer-to-peer computing, grid and cluster computing, reliability, fault-tolerance, and security; performance evaluation and measurement; tools and environments for software development; distributed systems and applications; high performance scientific and engineering computing; database applications and data mining; HPSRF; pervasive computing and communications; and LMS.

High Performance Computing

2.1 RSA Cryptosystem RSA is one of the most famous public key cryptosystems suitable for both, encryption and digital signature. It consists of three main ...

High Performance Computing

Author: Carlos Jaime Barrios Hernández

Publisher: Springer

ISBN: 331957972X

Page: 408

View: 697

This book constitutes the proceedings of the Third Latin American Conference on High Performance Computing, CARLA 2016, held in Mexico City, Mexico, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 70 submissions. They are organized in topical sections named: HPC Infrastructure and Applications; Parallel Algorithms and Applications; HPC Applications and Simulations.

Cybersecurity Readiness

A Holistic and High-Performance Approach Dave Chatterjee ... Digital signature is an encryption technique used for authentication and to achieve the data ...

Cybersecurity Readiness

Author: Dave Chatterjee

Publisher: SAGE Publications

ISBN: 1071837354

Page: 336

View: 385

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.

High Performance Logic And Circuits For High speed Electronic Systems

... those digital signatures could be integrated into cryptographic primitives. ... we propose a novel counterfeit PCB authentication approach that utilizes ...

High Performance Logic And Circuits For High speed Electronic Systems

Author: Jain Faquir C

Publisher: World Scientific

ISBN: 981120845X

Page: 192

View: 890

In this volume, we have put together papers spanning a broad range — from the area of modeling of strain and misfit dislocation densities, microwave absorption characteristics of nanocomposites, to X-ray diffraction studies.Specific topics in this volume include:In summary, papers selected in this volume cover various aspects of high performance logic and circuits for high-speed electronic systems.

High Performance Architecture and Grid Computing

In 2010, Brandic and Dustdar [9] proposed a novel approach for compliance ... in the cloud by implementation of digital signature with RSA algorithm.

High Performance Architecture and Grid Computing

Author: Archana Mantri

Publisher: Springer

ISBN: 3642225772

Page: 659

View: 132

This book constitutes the refereeds proceedings of the International Conference on High Performance Architecture and Grid Computing, HPAGC 2011, held in Chandigarh, India, in July 2011. The 87 revised full papers presented were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on grid and cloud computing; high performance architecture; information management and network security.

Intelligent Information and Database Systems

... availability of low cost, high performance digital cameras and internet, ... A similar approach is to extract digital signature from video and detect ...

Intelligent Information and Database Systems

Author: Jeng-Shyang Pan

Publisher: Springer Science & Business Media

ISBN: 3642284922

Page: 529

View: 411

The three-volume set LNAI 7196, LNAI 7197 and LNAI 7198 constitutes the refereed proceedings of the 4th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2012, held in Kaohsiung, Taiwan in March 2012. The 161 revised papers presented were carefully reviewed and selected from more than 472 submissions. The papers included cover the following topics: intelligent database systems, data warehouses and data mining, natural language processing and computational linguistics, semantic Web, social networks and recommendation systems, collaborative systems and applications, e-bussiness and e-commerce systems, e-learning systems, information modeling and requirements engineering, information retrieval systems, intelligent agents and multi-agent systems, intelligent information systems, intelligent internet systems, intelligent optimization techniques, object-relational DBMS, ontologies and knowledge sharing, semi-structured and XML database systems, unified modeling language and unified processes, Web services and semantic Web, computer networks and communication systems.

High Performance Computing in Finance

... 571, 573 Dynamic programming approach, 433–434 Dynamic Scenario Generator, ... 38–39 ECDSA, see Elliptic Curve Digital Signature Algorithm ...

High Performance Computing in Finance

Author: M. A. H. Dempster

Publisher: CRC Press

ISBN: 1482299674

Page: 614

View: 143

High-Performance Computing (HPC) delivers higher computational performance to solve problems in science, engineering and finance. There are various HPC resources available for different needs, ranging from cloud computing– that can be used without much expertise and expense – to more tailored hardware, such as Field-Programmable Gate Arrays (FPGAs) or D-Wave’s quantum computer systems. High-Performance Computing in Finance is the first book that provides a state-of-the-art introduction to HPC for finance, capturing both academically and practically relevant problems.

Information Systems Security

... use methods such as digital signature [3, 4] and Merkle Hash Tree (MHT) [5]. ... We experimentally show that our approach has a higher performance ...

Information Systems Security

Author: Venkat Venkatakrishnan

Publisher: Springer Science & Business Media

ISBN: 3642351301

Page: 353

View: 411

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

2013 International Conference on Computer Science and Artificial Intelligence

The security performance of such digital signature was also addressed. ... security technology of two systems, so that it can reach high security index.

2013 International Conference on Computer Science and Artificial Intelligence

Author: Dr. Yuetong Lin

Publisher: DEStech Publications, Inc

ISBN: 1605951323

Page:

View: 786

The main objective of ICCSAI2013 is to provide a platform for the presentation of top and latest research results in global scientific areas. The conference aims to provide a high level international forum for researcher, engineers and practitioners to present and discuss recent advances and new techniques in computer science and artificial intelligence. It also serves to foster communications among researcher, engineers and practitioners working in a common interest in improving computer science, artificial intelligence and the related fields. We have received 325 numbers of papers through "Call for Paper", out of which 94 numbers of papers were accepted for publication in the conference proceedings through double blind review process. The conference is designed to stimulate the young minds including Research Scholars, Academicians, and Practitioners to contribute their ideas, thoughts and nobility in these two disciplines.

Multidisciplinary Approach to Modern Digital Steganography

Very high PSNR value with better embedding capacity. ... Hiding in Colour Image using Steganography and Cryptography based on Digital Signature Concepts.

Multidisciplinary Approach to Modern Digital Steganography

Author: Pramanik, Sabyasachi

Publisher: IGI Global

ISBN: 1799871622

Page: 380

View: 601

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Frontiers of High Performance Computing and Networking ISPA 2007 Workshops

... protection against different attacks by utilizing particular approaches. ... s solution [12], we comprehend a digital signature scheme that can avoid ...

Frontiers of High Performance Computing and Networking   ISPA 2007 Workshops

Author: Parimala Thulasiraman

Publisher: Springer Science & Business Media

ISBN: 9783540747666

Page: 536

View: 609

This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007, held in Niagara Falls, Canada in August 2007. The 53 revised full papers presented were carefully selected from many high quality submissions. The workshops contribute to enlarging the spectrum of the more general topics treated in the ISPA 2007 main conference.

Modeling Simulation and Optimization of Complex Processes

Proceedings of the Third International Conference on High Performance ... the authors developed an approach, called Digital Signature Aggregation and ...

Modeling  Simulation and Optimization of Complex Processes

Author: Hans Georg Bock

Publisher: Springer Science & Business Media

ISBN: 3540794093

Page: 666

View: 261

This proceedings volume covers the broad interdisciplinary spectrum of scientific computing and presents recent advances in theory, development of methods, and applications in practice.

Handbook of Internet Computing

Java bytecodes carry digital signature, which has special mathematical ... that is required for building high performance multi-threading applications.

Handbook of Internet Computing

Author: Borko Furht

Publisher: CRC Press

ISBN: 135108108X

Page: 548

View: 218

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.

High Performance Embedded Architectures and Compilers

In section 4, the stratified input sampling approach, as well as simple random ... algorithm that produce a 128-bit fingerprint, or digital signature.

High Performance Embedded Architectures and Compilers

Author: Tom Conte

Publisher: Springer

ISBN: 3540322728

Page: 318

View: 629

As Chairmen of HiPEAC 2005, we have the pleasure of welcoming you to the proceedings of the ?rst international conference promoted by the HiPEAC N- work of Excellence. During the last year, HiPEAC has been building its clusters of researchers in computer architecture and advanced compiler techniques for embedded and high-performance computers. Recently, the Summer School has been the seed for a fruitful collaboration of renowned international faculty and young researchers from 23 countries with fresh new ideas. Now, the conference promises to be among the premier forums for discussion and debate on these research topics. Theprestigeofasymposiumismainlydeterminedbythequalityofitstech- cal program. This ?rst programlived up to our high expectations, thanks to the largenumber of strong submissions. The ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and another one as an invited paper. Each paper was rigorously reviewed by three ProgramCommittee members and at least one external referee. Many reviewers spent a great amount of e?ort to provide detailed feedback. In many cases, such feedback along with constructive shepherding resulted in dramatic improvement in the quality of accepted papers. The names of the Program Committee m- bers and the referees are listed in the proceedings. The net result of this team e?ort is that the symposium proceedings include outstanding contributions by authors from nine countries in three continents. In addition to paper presentations, this ?rst HiPEAC conference featured two keynotes delivered by prominent researchers from industry and academia.

High Performance Cloud Auditing and Applications

To assure clients' accountability, every request contains a digital signature that can be used to uniquely identify its sender and assures the integrity of ...

High Performance Cloud Auditing and Applications

Author: Keesook J. Han

Publisher: Springer Science & Business Media

ISBN: 1461432960

Page: 360

View: 375

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: · Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures · Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies · Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets

Computational Science and Its Applications ICCSA 2005

Secure XML Aware Network Design and Performance Analysis Eui-Nam Huh1, ... and digital signature for authentication and integrity are the most important ...

Computational Science and Its Applications   ICCSA 2005

Author: Osvaldo Gervasi

Publisher: Springer

ISBN: 3540320431

Page: 1234

View: 285

The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.

Advances in Computer Science for Engineering and Education II

The attractiveness of the approach based on the elliptic curves in ... signature on elliptic curves defined over the field of higher performance [1, 4].

Advances in Computer Science for Engineering and Education II

Author: Zhengbing Hu

Publisher: Springer

ISBN: 303016621X

Page: 671

View: 864

This book gathers high-quality, peer-reviewed research papers presented at the Second International Conference on Computer Science, Engineering and Education Applications (ICCSEEA2019), held in Kiev, Ukraine on 26–27 January 2019, and jointly organized by the National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” and the International Research Association of Modern Education and Computer Science. The papers discuss state-of-the-art topics and advances in computer science; neural networks; pattern recognition; engineering techniques; genetic coding systems; deep learning and its medical applications; and knowledge representation and its applications in education. Given its scope, the book offers an excellent resource for researchers, engineers, management practitioners, and graduate and undergraduate students interested in computer science and its applications in engineering and education.