首页    期刊浏览 2024年09月15日 星期日
登录注册

文章基本信息

  • 标题:Cryptography and its two Implementation Approaches
  • 作者:GAGANDEEP SHAHI ; CHARANJIT SINGH
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2013
  • 卷号:1
  • 期号:3
  • 出版社:S&S Publications
  • 摘要:In the modern digital world inviolability of the crucial facts is an essential part for data security. The entireworld becoming a village due to the digital data conveys through network of networks called internet. With availabilityof network everywhere the common man perform transactions such as buying and selling the products called ecommerce,cash submission and withdrawal from bank with the help of e-banking etc. Network may be insecure wherethe people transmitting their decisive data, valuable information in the form of conspicuous passwords etc. Thirdparties like hackers who do not have the authority can hack the data. They can destroy confidentiality of the facts,integrity of the facts as well as availability ofthe facts. To prevent this, cryptography must be there. In this paper wewill discuss about the cryptography and its two implementation approaches Known as Peer to Peer (P2P) Trusted ThirdParty Cryptography Approaches which is based upon Client Server Computing
  • 关键词:Cryptography; Trusted Third Party; Peer to peer (P2P). Same key Cryptography; Different Key;Cryptography; and Hash cryptography
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有