Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvem...
| Main Authors: | Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2007
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/48248/ http://psasir.upm.edu.my/id/eprint/48248/1/Enhancing%20security%20performance%20with%20parallel%20crypto%20operations%20in%20SSL%20bulk%20data%20transfer%20phase.pdf |
Similar Items
Improving security performance with parallel crypto operations in SSL bulk data transfer
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013)
by: Alkhatib, Mohammad, et al.
Published: (2013)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
Security enhancement of route optimization in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Mischaracterised “Personal-Use” Crypto Assets
by: Allen, Christina
Published: (2024)
by: Allen, Christina
Published: (2024)
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)
by: Azizah, Abdul Aziz, et al.
Published: (2020)
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023)
by: Gan, Hing Long
Published: (2023)
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006)
by: Ahmad, Illiasaak, et al.
Published: (2006)
Design and implementation of a private and public key crypto processor for next-generation it security applications
by: Hani, Mohamed Khalil, et al.
Published: (2006)
by: Hani, Mohamed Khalil, et al.
Published: (2006)
IoT Light Weight (LWT) crypto functions
by: Jaleel, Nubila, et al.
Published: (2019)
by: Jaleel, Nubila, et al.
Published: (2019)
Crypto Assets: Tax Law and Policy in Australia
by: Allen, Christina, et al.
Published: (2024)
by: Allen, Christina, et al.
Published: (2024)
The determinants of crypto currency price: the case of Bitcoin
by: Woo, Xue Ling, et al.
Published: (2019)
by: Woo, Xue Ling, et al.
Published: (2019)
KE ARAH MENCAPAI 100% KADAR SARA DIRI (SSL) BERAS: SATU
SASARAN REALISTIK ATAU RETORIK?
by: Badarudin, Radin Firdaus Radin, et al.
Published: (2017)
by: Badarudin, Radin Firdaus Radin, et al.
Published: (2017)
U-shaped inductively coupled feed RFID tag antenna for gain enhancement
by: Alhawari, Adam Reda Hasan, et al.
Published: (2013)
by: Alhawari, Adam Reda Hasan, et al.
Published: (2013)
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012)
by: Mehdizadeh, Abbas, et al.
Published: (2012)
U-shaped inductively coupled feed radio frequency identification tag antennas for gain enhancement
by: Alhawari, Adam Reda Hasan, et al.
Published: (2014)
by: Alhawari, Adam Reda Hasan, et al.
Published: (2014)
Speed estimation in forward scattering radar by using Standard Deviation method
by: Salah, Mutaz, et al.
Published: (2009)
by: Salah, Mutaz, et al.
Published: (2009)
A framework for the development of a National Crypto-Currency
by: Abdullah, Adam, et al.
Published: (2018)
by: Abdullah, Adam, et al.
Published: (2018)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Bandwidth enhancement for microstrip antenna in wireless applications
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
Improvement in detection with forward scattering radar
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2011)
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2011)
Target detection in forward scattering radar
by: Mohamed, Mohamed Khalaf Alla Hassan, et al.
Published: (2009)
by: Mohamed, Mohamed Khalaf Alla Hassan, et al.
Published: (2009)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020)
by: Jaleel, Nubila, et al.
Published: (2020)
Asymmetric volatility and risk analysis of Bitcoin Crypto currency market
by: Yam, Xing Quan, et al.
Published: (2023)
by: Yam, Xing Quan, et al.
Published: (2023)
A true random number generator for crypto embedded systems
by: M.Thamrin, Norashikin, et al.
Published: (2006)
by: M.Thamrin, Norashikin, et al.
Published: (2006)
Flow-based approach on bro intrusion detection
by: Alaidaros, Hashem, et al.
Published: (2017)
by: Alaidaros, Hashem, et al.
Published: (2017)
Adaptive data collection algorithm for wireless sensor networks
by: Vahabi, Maryam, et al.
Published: (2008)
by: Vahabi, Maryam, et al.
Published: (2008)
Traffic aware data collection MAC protocol for wireless sensor networks
by: Vahabi, Maryam, et al.
Published: (2008)
by: Vahabi, Maryam, et al.
Published: (2008)
Energy efficiency in MAC 802.15.4 for wireless sensor networks
by: Ghazvini, Mohammad Hossein Fotouhi, et al.
Published: (2008)
by: Ghazvini, Mohammad Hossein Fotouhi, et al.
Published: (2008)
Trade-off between energy consumption and target delay for wireless sensor network
by: Vahabi, Maryam, et al.
Published: (2007)
by: Vahabi, Maryam, et al.
Published: (2007)
Adaptive MAC protocol for wireless sensor networks in periodic data collection applications
by: Vahabi, Maryam, et al.
Published: (2008)
by: Vahabi, Maryam, et al.
Published: (2008)
Design of a high speed and low latency crypto-processor ASIC
by: Ali, Md. Liakot, et al.
Published: (2008)
by: Ali, Md. Liakot, et al.
Published: (2008)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Chlorine decay prediction in bulk water using the parallel second order model: An analytical solution development
by: Jabari Kohpaei, Ahmad, et al.
Published: (2011)
by: Jabari Kohpaei, Ahmad, et al.
Published: (2011)
Computational analysis of two-phase flow and heat transfer in parallel and counter flow double-pipe evaporators
by: Abishek, Sridhar, et al.
Published: (2017)
by: Abishek, Sridhar, et al.
Published: (2017)
Similar Items
-
Improving security performance with parallel crypto operations in SSL bulk data transfer
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009) -
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013) -
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)