• No results found

[PDF] Top 20 Jini distributed key exchange and file transfer service with digital signatures

Has 10000 "Jini distributed key exchange and file transfer service with digital signatures" found on our website. Below are the top 20 most common "Jini distributed key exchange and file transfer service with digital signatures".

Jini distributed key exchange and file transfer service with digital signatures

Jini distributed key exchange and file transfer service with digital signatures

... Cryptographic Service Provider (provider) that implements the Diffie- Hellman Key Agreement Algorithm, the Digital Signature Algorithm, and the Advanced Encryption Standard Algorithm ...two ... See full document

15

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

... secured file transfer service which controls and authenticates the data transfer through service blocking mechanism and digital signatures at the first two levels and by ... See full document

5

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

... secured file transfer service which controls and authenticates the data transfer through service blocking mechanism and digital signatures at the first two levels and by ... See full document

5

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS 
INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

... Evaluation of implemented model performance is crucial and beneficial to both service providers and service users. The results were satisfactory and show good performance. It was observed that servers ... See full document

10

An Advanced Crypto Based Security System for Medical Image/Data Transfer

An Advanced Crypto Based Security System for Medical Image/Data Transfer

... electronic exchange of medical images between hospitals, physicians and ...for Digital Imaging and Communications in Medicine and it is the most universal and fundamental standard in digital medical ... See full document

6

A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation

A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation

... TOSCA is currently advanced in its specification for orchestration which makes it an ideal candidate for becoming the standard blueprint definition for containers. The fact that TOSCA is backed by a standards body ... See full document

9

California ISO Secure File Transfer Protocol (SFTP) Service Technical Specification

California ISO Secure File Transfer Protocol (SFTP) Service Technical Specification

... SFTP Service is a method by which a Market Participant can pull files over a secure encrypted file transfer connection from ...This service uses the SFTP (File Transfer Protocol ... See full document

8

A Proposed Code of Professional Responsibility for Certification Authorities, 17 J. Marshall J. Computer & Info. L. 1003 (1999)

A Proposed Code of Professional Responsibility for Certification Authorities, 17 J. Marshall J. Computer & Info. L. 1003 (1999)

... 50. Ancillary service is 1) a person offering or performing a service, other than issu- ance of a certificate, in support of digital signatures and other related areas [r] ... See full document

41

ADAPTIVE COLOR FILTER ARRAY INTERPOLATION ALGORITHM BASED ON HUE TRANSITION AND 
EDGE DIRECTION

ADAPTIVE COLOR FILTER ARRAY INTERPOLATION ALGORITHM BASED ON HUE TRANSITION AND EDGE DIRECTION

... In this paper, we focused on making electronic power of attorney protocol. Power of attorney is a letter that authorizes the holder to carry out specified power given by the grantor. Generally power of attorney consist ... See full document

6

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION

... The Jini architecture principle is similar to the ...a Jini network is called as Discovery and Join ...a Jini network, a device or application places itself into the Lookup Table on a lookup server, ... See full document

9

Authenticated Key Exchange Protocols for Parallel Network File Systems

Authenticated Key Exchange Protocols for Parallel Network File Systems

... Single Sign-on. In NFS/pNFS that employs kerberos, each storage device shares a (long- term) symmetric key with the metadata server (which acts as the KDC). Kerberos then allows the client to perform single sign- ... See full document

6

SECURE KEY AGREEMENT FOR  SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.

SECURE KEY AGREEMENT FOR SHARING GROUP DATA AND FIND DATA DEDUPLICATION IN CLOUD.

... from key agreement downside. In projected System, to urge eliminate key agreement downside , we have a tendency to tend to implement block vogue primarily based key agreement protocol to share ... See full document

6

Parallel Network File System with Authenticated Key Exchange Protocols

Parallel Network File System with Authenticated Key Exchange Protocols

... Password-Authenticated Key Exchange (PAKE) studies how to establish secure communication between two remote parties solely based on their shared password, without requiring a Public Key ... See full document

5

A Novel Digital Information Service for Federating Distributed Digital Entities

A Novel Digital Information Service for Federating Distributed Digital Entities

... requirements, Digital Information Service infrastructure supports various metadata fields to represent the complete metadata about a scholarly ...a Digital Information System called ... See full document

31

A Secured Authenticated Key Exchange Protocols for Parallel Network File Systems

A Secured Authenticated Key Exchange Protocols for Parallel Network File Systems

... 2.3 Passwords are a standout amongst the most well-known reasons for framework crashes, in light of the fact that the low entropy of passwords makes frameworks helpless against savage power speculating assaults. Because ... See full document

5

Parallel network file systems using authenticated key exchange protocols

Parallel network file systems using authenticated key exchange protocols

... supporting a large number of clients is further illustrated in the left graph of Fig.3 when we consider each client requesting access to an average of n = 103 storage devices. Moreover, the additional overhead for C (and ... See full document

9

Novel Efficient and secure protocol design to exchange information in network

Novel Efficient and secure protocol design to exchange information in network

... with the information server is compromised. we believe that this can be a realistic threat since a large-scale file system could have thousands of geographically distributed storage devices.It may not be ... See full document

7

IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS

IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS

... a distributed computing framework that operates under the client-server ...a Jini community using any distributed computing ...and service are differentiated in a Jini environment. A ... See full document

11

QOS Modelling for Software Service Improvement using Adaptive Learning

QOS Modelling for Software Service Improvement using Adaptive Learning

... The flexibility of Cloud-Based Software is responsible for a model change in the way we handle and constantly develop cloud-based application solutions. However, it would be a challenge for application technicians and ... See full document

6

A Novel Digital Information Service for Federating Distributed Digital Entities

A Novel Digital Information Service for Federating Distributed Digital Entities

... the Digital Information Service has been designed to ensure eventual consistency between distributed annotation records that are stored at the integrated annotation tools and a primary copy of each ... See full document

26

Show all 10000 documents...