High Performance Approach for Digital Signature

High Performance Approach for Digital Signature

High Performance Approach for Digital Signature that is Called Grid Signature is applied through the separation of the message, into blocks and encrypting each block to get cipher blocks.

Author: Iyad Shaheen

Publisher: LAP Lambert Academic Publishing

ISBN: 3844326154

Category:

Page: 132

View: 724

Grid computing is one of the most powerful techniques that can achieve a high acceleration for cryptographic algorithms. This approach makes the digital signature attractive for adoption by businesses to secure their documents. In this thesis, we propose and develop an application for digital signature cryptography using enterprise grid middleware called Alchemi. High Performance Approach for Digital Signature that is Called Grid Signature is applied through the separation of the message, into blocks and encrypting each block to get cipher blocks. Inside Alchemi, it computing the hash code is used for cipher blocks in independent Alchemi executors and any result of computing hash 160 bit is added to other in exclusive disjunction logic gate; the result is called Grid Hash . The evaluation of performance in the grid signature depends on three relations: file size; block size and number of executors. For each file the sign or verify was carried on 1, 2, 3, 4 and 5 executor nodes. So the performance is reached when using file size 82MB and under running 4 executors to 137.96% of speed up over the single processor version.
Categories:

High Performance Computing and Communications

High Performance Computing and Communications

... carrying out the security and performance critical operation for digital signature, i.e. modular exponentiation. ... The presented work provided an approach and proof-ofconcept implementation for provisioning of security services in ...

Author: Jack Dongarra

Publisher: Springer Science & Business Media

ISBN: 9783540290315

Category: Computers

Page: 1118

View: 638

This book constitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, HPCC 2005, held in Sorrento, Italy in September 2005. The 76 revised full papers and 44 revised short papers presented were carefully reviewed and selected from 273 submissions. The papers are organized in topical sections on network protocols, routing, and algorithms; languages and compilers for HPC; parallel and distributed system architectures; embedded systems; parallel and distributed algorithms, wireless and mobile computing, Web services and Internet computing; peer-to-peer computing, grid and cluster computing, reliability, fault-tolerance, and security; performance evaluation and measurement; tools and environments for software development; distributed systems and applications; high performance scientific and engineering computing; database applications and data mining; HPSRF; pervasive computing and communications; and LMS.
Categories: Computers

High Performance Computing

High Performance Computing

Similarly, the RSA private operation can be used for data decryption or for performing the digital signature of a ... One useful approach for attaining this aim, is to make use of the Chinese Remainder Theorem, which allows us to trade ...

Author: Carlos Jaime Barrios Hernández

Publisher: Springer

ISBN: 9783319579726

Category: Computers

Page: 408

View: 115

This book constitutes the proceedings of the Third Latin American Conference on High Performance Computing, CARLA 2016, held in Mexico City, Mexico, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 70 submissions. They are organized in topical sections named: HPC Infrastructure and Applications; Parallel Algorithms and Applications; HPC Applications and Simulations.
Categories: Computers

Cybersecurity Readiness

Cybersecurity Readiness

A Holistic and High-Performance Approach Dave Chatterjee. Managing Removable Media: Guiding Questions 1. ... Digital signature is an encryption technique used for authentication and to achieve the data integrity goal of nonrepudiation.

Author: Dave Chatterjee

Publisher: SAGE Publications

ISBN: 9781071837351

Category: Business & Economics

Page: 336

View: 963

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.
Categories: Business & Economics

High Performance Logic And Circuits For High speed Electronic Systems

High Performance Logic And Circuits For High speed Electronic Systems

Weak PUFs can directly digitize a “fingerprint” of the circuit and those digital signatures could be integrated ... PCB authentication approach that utilizes the RC pair variations on a manufactured PCB to create a unique signature.

Author: Jain Faquir C

Publisher: World Scientific

ISBN: 9789811208454

Category: Technology & Engineering

Page: 192

View: 841

In this volume, we have put together papers spanning a broad range — from the area of modeling of strain and misfit dislocation densities, microwave absorption characteristics of nanocomposites, to X-ray diffraction studies.Specific topics in this volume include:In summary, papers selected in this volume cover various aspects of high performance logic and circuits for high-speed electronic systems.
Categories: Technology & Engineering

Department of Defense Appropriations for 1994 Research development test and evaluation

Department of Defense Appropriations for 1994  Research  development  test  and evaluation

... COMPUTING SAFEGUARDS PROGRAM WORKSHOP ON HIGH PERFORMANCE COMPUTING STRATEGIC COMPUTING INITIATIVE MICRO - MECHANICAL INFRASTRUCTURE DIGITAL SIGNATURE STANDARD UNIFIED APPROACH TO OPTIMAL COMPUTING IWARP / NECTAR IMAGE UNDERSTANDING ...

Author: United States. Congress. House. Committee on Appropriations. Subcommittee on Dept. of Defense

Publisher:

ISBN: UCAL:B4682602

Category:

Page:

View: 605

Categories:

Department of Defense Appropriations for 1994

Department of Defense Appropriations for 1994

... COMPUTING SAFEGUARDS PROGRAM WORKSHOP ON HIGH PERFORMANCE COMPUTING STRATEGIC COMPUTING INITIATIVE MICRO - MECHANICAL INFRASTRUCTURE DIGITAL SIGNATURE STANDARD UNIFIED APPROACH TO OPTIMAL COMPUTING IWARP / NECTAR IMAGE UNDERSTANDING ...

Author: United States. Congress. House. Committee on Appropriations. Subcommittee on Department of Defense

Publisher:

ISBN: LOC:0018582746A

Category: Government publications

Page:

View: 532

Categories: Government publications

High Performance Architecture and Grid Computing

High Performance Architecture and Grid Computing

In 2010, Brandic and Dustdar [9] proposed a novel approach for compliance management in clouds, ... [12] suggested the cloud storage and data security in the cloud by implementation of digital signature with RSA algorithm.

Author: Archana Mantri

Publisher: Springer

ISBN: 9783642225772

Category: Computers

Page: 659

View: 378

This book constitutes the refereeds proceedings of the International Conference on High Performance Architecture and Grid Computing, HPAGC 2011, held in Chandigarh, India, in July 2011. The 87 revised full papers presented were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on grid and cloud computing; high performance architecture; information management and network security.
Categories: Computers

Intelligent Information and Database Systems

Intelligent Information and Database Systems

1 Introduction With the recent advances in digital media technologies, availability of low cost, high performance ... A similar approach is to extract digital signature from video and detect changes in signature for tamper detection.

Author: Jeng-Shyang Pan

Publisher: Springer Science & Business Media

ISBN: 9783642284922

Category: Computers

Page: 529

View: 577

The three-volume set LNAI 7196, LNAI 7197 and LNAI 7198 constitutes the refereed proceedings of the 4th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2012, held in Kaohsiung, Taiwan in March 2012. The 161 revised papers presented were carefully reviewed and selected from more than 472 submissions. The papers included cover the following topics: intelligent database systems, data warehouses and data mining, natural language processing and computational linguistics, semantic Web, social networks and recommendation systems, collaborative systems and applications, e-bussiness and e-commerce systems, e-learning systems, information modeling and requirements engineering, information retrieval systems, intelligent agents and multi-agent systems, intelligent information systems, intelligent internet systems, intelligent optimization techniques, object-relational DBMS, ontologies and knowledge sharing, semi-structured and XML database systems, unified modeling language and unified processes, Web services and semantic Web, computer networks and communication systems.
Categories: Computers

High Performance Computing in Finance

High Performance Computing in Finance

... 571, 573 Dynamic programming approach, 433–434 Dynamic Scenario Generator, 124 Dynamic stochastic general equilibrium models, 553 Dynamic strategy using money management, 38–39 ECDSA, see Elliptic Curve Digital Signature Algorithm ...

Author: M. A. H. Dempster

Publisher: CRC Press

ISBN: 9781482299670

Category: Computers

Page: 614

View: 631

High-Performance Computing (HPC) delivers higher computational performance to solve problems in science, engineering and finance. There are various HPC resources available for different needs, ranging from cloud computing– that can be used without much expertise and expense – to more tailored hardware, such as Field-Programmable Gate Arrays (FPGAs) or D-Wave’s quantum computer systems. High-Performance Computing in Finance is the first book that provides a state-of-the-art introduction to HPC for finance, capturing both academically and practically relevant problems.
Categories: Computers

Information Systems Security

Information Systems Security

The existing approaches for correctness verification use methods such as digital signature [3, 4] and Merkle Hash Tree (MHT) [5]. ... We experimentally show that our approach has a higher performance compared to the exiting methods.

Author: Venkat Venkatakrishnan

Publisher: Springer Science & Business Media

ISBN: 9783642351303

Category: Computers

Page: 353

View: 814

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.
Categories: Computers

2013 International Conference on Computer Science and Artificial Intelligence

2013 International Conference on Computer Science and Artificial Intelligence

The security performance of such digital signature was also addressed. This system of digital signature inherits security technology of two systems, so that it can reach high security index. It provides guarantee for integrity check and ...

Author: Dr. Yuetong Lin

Publisher: DEStech Publications, Inc

ISBN: 9781605951324

Category: Computers

Page:

View: 128

The main objective of ICCSAI2013 is to provide a platform for the presentation of top and latest research results in global scientific areas. The conference aims to provide a high level international forum for researcher, engineers and practitioners to present and discuss recent advances and new techniques in computer science and artificial intelligence. It also serves to foster communications among researcher, engineers and practitioners working in a common interest in improving computer science, artificial intelligence and the related fields. We have received 325 numbers of papers through "Call for Paper", out of which 94 numbers of papers were accepted for publication in the conference proceedings through double blind review process. The conference is designed to stimulate the young minds including Research Scholars, Academicians, and Practitioners to contribute their ideas, thoughts and nobility in these two disciplines.
Categories: Computers

Frontiers of High Performance Computing and Networking ISPA 2007 Workshops

Frontiers of High Performance Computing and Networking   ISPA 2007 Workshops

Furthermore, an attacker could manipulate a lower-level protocol to interrupt a security mechanism in a higher- level. ... s solution [12], we comprehend a digital signature scheme that can avoid malicious nodes to fake route messages.

Author: Parimala Thulasiraman

Publisher: Springer Science & Business Media

ISBN: 3540747664

Category: Computers

Page: 536

View: 993

This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007, held in Niagara Falls, Canada in August 2007. The 53 revised full papers presented were carefully selected from many high quality submissions. The workshops contribute to enlarging the spectrum of the more general topics treated in the ISPA 2007 main conference.
Categories: Computers

Modeling Simulation and Optimization of Complex Processes

Modeling  Simulation and Optimization of Complex Processes

Proceedings of the Third International Conference on High Performance Scientific Computing, March 6-10, 2006, Hanoi, ... Last, in [NaT06], the authors developed an approach, called Digital Signature Aggregation and Chaining (DSAC), ...

Author: Hans Georg Bock

Publisher: Springer Science & Business Media

ISBN: 9783540794097

Category: Computers

Page: 666

View: 304

This proceedings volume covers the broad interdisciplinary spectrum of scientific computing and presents recent advances in theory, development of methods, and applications in practice.
Categories: Computers

Handbook of Internet Computing

Handbook of Internet Computing

Java has adopted the combination of the following three different approaches: • Code signing • Sandboxing • Trusted ... Java bytecodes carry digital signature, which has special mathematical properties that is difficult to forge.

Author: Borko Furht

Publisher: CRC Press

ISBN: 9781351081085

Category: Computers

Page: 548

View: 614

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.
Categories: Computers

Secure IT Systems

Secure IT Systems

m m 12 m 1 m 2 m 34 m 3 m 4 For example, in case of l = 4, the batch signature of [PB99] for a batch M1 ,M2 ,M3 ,M4 is ... xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> High-Performance Qualified Digital Signatures for X-Road 131 4 ...

Author: Hanne Riis Nielsen

Publisher: Springer

ISBN: 9783642414886

Category: Computers

Page: 321

View: 205

This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.
Categories: Computers

High Performance Embedded Architectures and Compilers

High Performance Embedded Architectures and Compilers

In section 4, the stratified input sampling approach, as well as simple random sampling and systematic sampling are presented. ... Md4 Cryptographic algorithm that produce a 128-bit fingerprint, or digital signature.

Author: Tom Conte

Publisher: Springer

ISBN: 9783540322726

Category: Computers

Page: 318

View: 755

As Chairmen of HiPEAC 2005, we have the pleasure of welcoming you to the proceedings of the ?rst international conference promoted by the HiPEAC N- work of Excellence. During the last year, HiPEAC has been building its clusters of researchers in computer architecture and advanced compiler techniques for embedded and high-performance computers. Recently, the Summer School has been the seed for a fruitful collaboration of renowned international faculty and young researchers from 23 countries with fresh new ideas. Now, the conference promises to be among the premier forums for discussion and debate on these research topics. Theprestigeofasymposiumismainlydeterminedbythequalityofitstech- cal program. This ?rst programlived up to our high expectations, thanks to the largenumber of strong submissions. The ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and another one as an invited paper. Each paper was rigorously reviewed by three ProgramCommittee members and at least one external referee. Many reviewers spent a great amount of e?ort to provide detailed feedback. In many cases, such feedback along with constructive shepherding resulted in dramatic improvement in the quality of accepted papers. The names of the Program Committee m- bers and the referees are listed in the proceedings. The net result of this team e?ort is that the symposium proceedings include outstanding contributions by authors from nine countries in three continents. In addition to paper presentations, this ?rst HiPEAC conference featured two keynotes delivered by prominent researchers from industry and academia.
Categories: Computers

High Performance Cloud Auditing and Applications

High Performance Cloud Auditing and Applications

To assure clients' accountability, every request contains a digital signature that can be used to uniquely identify its sender and assures the integrity of the message. The collection of such signatures from all clients corresponding to ...

Author: Keesook J. Han

Publisher: Springer Science & Business Media

ISBN: 9781461432968

Category: Computers

Page: 360

View: 517

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: · Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures · Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies · Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets
Categories: Computers

Computational Science and Its Applications ICCSA 2005

Computational Science and Its Applications   ICCSA 2005

Secure XML Aware Network Design and Performance Analysis Eui-Nam Huh1, Jong-Youl Jeong2, Young-Shin Kim1, and Ki-Young ... and digital signature for authentication and integrity are the most important procedures in XML based e-commerce.

Author: Osvaldo Gervasi

Publisher: Springer

ISBN: 9783540320432

Category: Computers

Page: 1234

View: 392

The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.
Categories: Computers

Advances in Computer Science for Engineering and Education II

Advances in Computer Science for Engineering and Education II

The attractiveness of the approach based on the elliptic curves in comparison with RSA is that using an elliptic ... Therefore, we consider the electronic signature on elliptic curves defined over the field of higher performance [1, 4].

Author: Zhengbing Hu

Publisher: Springer

ISBN: 9783030166212

Category: Technology & Engineering

Page: 671

View: 573

This book gathers high-quality, peer-reviewed research papers presented at the Second International Conference on Computer Science, Engineering and Education Applications (ICCSEEA2019), held in Kiev, Ukraine on 26–27 January 2019, and jointly organized by the National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” and the International Research Association of Modern Education and Computer Science. The papers discuss state-of-the-art topics and advances in computer science; neural networks; pattern recognition; engineering techniques; genetic coding systems; deep learning and its medical applications; and knowledge representation and its applications in education. Given its scope, the book offers an excellent resource for researchers, engineers, management practitioners, and graduate and undergraduate students interested in computer science and its applications in engineering and education.
Categories: Technology & Engineering