Essays about: "security performance in AES"

Showing result 16 - 20 of 20 essays containing the words security performance in AES.

  1. 16. Performance analysis of GPGPU and CPU on AES Encryption

    University essay from Blekinge Tekniska Högskola/Institutionen för kommunikationssystem

    Author : Akash Kiran Neelap; [2014]
    Keywords : AES algorithm; CUDA; GPU computing; Pthreads;

    Abstract : The advancements in computing have led to tremendous increase in the amount of data being generated every minute, which needs to be stored or transferred maintaining high level of security. The military and armed forces today heavily rely on computers to store huge amount of important and secret data, that holds a big deal for the security of the Nation. READ MORE

  2. 17. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE

  3. 18. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE

  4. 19. Implementing the Transport Layer Security Protocol for Embedded Systems

    University essay from Institutionen för systemteknik

    Author : Bengt Werstén; [2007]
    Keywords : TLS; SSL; embedded systems; cryptography; hardware support; export laws;

    Abstract : Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. READ MORE

  5. 20. Secure Mobile Voice over IP

    University essay from KTH/Mikroelektronik och Informationsteknik, IMIT

    Author : Israel Manuel Abad Caballero; [2003]
    Keywords : security; voice over IP; Secure Real-Time Protocol SRTP;

    Abstract : Voice over IP (VoIP) can be defined as the ability to make phone calls and to send faxes (i.e., to do everything we can do today with the Public Switched Telephone Network, PSTN) over IP−based data networks with a suitable quality of service and potentially a superior cost/benefit ratio. READ MORE