Improving security performance with parallel crypto operations in SSL bulk data transfer
Information security, including integrity and privacy, is an important concern among today’s computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement....
| Main Authors: | Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Malaysian Society for Cryptology Research
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/51912/ http://psasir.upm.edu.my/id/eprint/51912/1/Improving%20security%20performance%20with%20parallel%20crypto%20operations%20in%20SSL%20bulk%20data%20transfer.pdf |
Similar Items
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013)
by: Alkhatib, Mohammad, et al.
Published: (2013)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
Mischaracterised “Personal-Use” Crypto Assets
by: Allen, Christina
Published: (2024)
by: Allen, Christina
Published: (2024)
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)
by: Azizah, Abdul Aziz, et al.
Published: (2020)
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023)
by: Gan, Hing Long
Published: (2023)
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006)
by: Ahmad, Illiasaak, et al.
Published: (2006)
Design and implementation of a private and public key crypto processor for next-generation it security applications
by: Hani, Mohamed Khalil, et al.
Published: (2006)
by: Hani, Mohamed Khalil, et al.
Published: (2006)
IoT Light Weight (LWT) crypto functions
by: Jaleel, Nubila, et al.
Published: (2019)
by: Jaleel, Nubila, et al.
Published: (2019)
Crypto Assets: Tax Law and Policy in Australia
by: Allen, Christina, et al.
Published: (2024)
by: Allen, Christina, et al.
Published: (2024)
The determinants of crypto currency price: the case of Bitcoin
by: Woo, Xue Ling, et al.
Published: (2019)
by: Woo, Xue Ling, et al.
Published: (2019)
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020)
by: Jaleel, Nubila, et al.
Published: (2020)
KE ARAH MENCAPAI 100% KADAR SARA DIRI (SSL) BERAS: SATU
SASARAN REALISTIK ATAU RETORIK?
by: Badarudin, Radin Firdaus Radin, et al.
Published: (2017)
by: Badarudin, Radin Firdaus Radin, et al.
Published: (2017)
A framework for the development of a National Crypto-Currency
by: Abdullah, Adam, et al.
Published: (2018)
by: Abdullah, Adam, et al.
Published: (2018)
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Asymmetric volatility and risk analysis of Bitcoin Crypto currency market
by: Yam, Xing Quan, et al.
Published: (2023)
by: Yam, Xing Quan, et al.
Published: (2023)
A true random number generator for crypto embedded systems
by: M.Thamrin, Norashikin, et al.
Published: (2006)
by: M.Thamrin, Norashikin, et al.
Published: (2006)
Flow-based approach on bro intrusion detection
by: Alaidaros, Hashem, et al.
Published: (2017)
by: Alaidaros, Hashem, et al.
Published: (2017)
Design of a high speed and low latency crypto-processor ASIC
by: Ali, Md. Liakot, et al.
Published: (2008)
by: Ali, Md. Liakot, et al.
Published: (2008)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
Chlorine decay prediction in bulk water using the parallel second order model: An analytical solution development
by: Jabari Kohpaei, Ahmad, et al.
Published: (2011)
by: Jabari Kohpaei, Ahmad, et al.
Published: (2011)
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
Parallelizing web scraping to improve performance and scalability
by: Na, Yi Chun
Published: (2023)
by: Na, Yi Chun
Published: (2023)
Interaction of human, rat, and mouse immunoglobulin A (IgA) with staphylococcal superantigen-like 7 (SSL7) decoy protein and leukocyte IgA receptor
by: Wines, B., et al.
Published: (2011)
by: Wines, B., et al.
Published: (2011)
Taxing staking arrangements – Looking down the rabbit hole of new crypto tax issues
by: Allen, Christina, et al.
Published: (2023)
by: Allen, Christina, et al.
Published: (2023)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
The effect of symmetric and asymmetric information on
volatility structure of crypto-currency markets: a case study of bitcoin currency
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
An empirical model of the bulk shipping market
by: Lun, V., et al.
Published: (2009)
by: Lun, V., et al.
Published: (2009)
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
Shariah perspective on crypto as asset (Mal): justifying the needs of estate planning and inheritance of digital asset
by: Norazlina Abd Wahab,, et al.
Published: (2023)
by: Norazlina Abd Wahab,, et al.
Published: (2023)
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006)
by: Ismail, Mohd. Izuan
Published: (2006)
Are the new crypto-currencies qualified to be included in the stock of high quality liquid assets? a case study of bitcoin currency
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Operation of context transfer protocol
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Similar Items
-
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007) -
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013) -
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)