A survey on edge performance benchmarking

B Varghese, N Wang, D Bermbach, CH Hong… - ACM Computing …, 2021 - dl.acm.org
Edge computing is the next Internet frontier that will leverage computing resources located
near users, sensors, and data stores to provide more responsive services. Therefore, it is …

Optimizing public-key encryption for wireless clients

NR Potlapally, S Ravi, A Raghunathan… - … . ICC 2002 (Cat. No …, 2002 - ieeexplore.ieee.org
Providing acceptable levels of security imposes significant computational requirements on
wireless clients, servers, and network elements. These requirements are often beyond the …

Distributed ledger technology based integrated healthcare solution for Bangladesh

MA Islam, MA Islam, MAH Jacky, M Al-Amin… - IEEE …, 2023 - ieeexplore.ieee.org
Healthcare data is highly sensitive and must be safeguarded. Personal and sensitive data,
such as names and addresses, is stored in Encrypted Electronic Health Records (EHRs) …

The impact of cloud computing technology on legal infrastructure within internet—focusing on the protection of information privacy

FC Cheng, WH Lai - Procedia Engineering, 2012 - Elsevier
The main purpose of this article is to focus on the issue of protecting information privacy
through the newly developed cloud computing technology. This article will first introduce the …

[图书][B] Public key cryptography: applications and attacks

LM Batten - 2013 - books.google.com
Complete coverage of the current major public key cryptosystems their underlying
mathematics and the most common techniques used in attacking them Public Key …

Techniques for efficient security processing

A Raghunathan, S Ravi, N Potlapally… - US Patent App. 10 …, 2003 - Google Patents
A programmable security processor for efficient execution of security protocols, wherein the
instruction set of the processor is enhanced to contain at least one instruction that is used to …

Anatomy and performance of SSL processing

L Zhao, R Iyer, S Makineni… - … on Performance Analysis …, 2005 - ieeexplore.ieee.org
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business
applications require the exchange of data to be highly secure. The Secure Sockets Layer …

[PDF][PDF] An overview of secure sockets layer

DSM Charjan, PSM Bochare… - Int. J. Comput. Sci …, 2013 - researchpublications.org
In recent years, there has been tremendous development in Internet. Right from retrieving
information about any subject, you can use Internet for many purposes. But when two parties …

Characterizing secure dynamic web applications scalability

J Guitart, V Beltran, D Carrera, J Torres… - 19th IEEE …, 2005 - ieeexplore.ieee.org
Security in the access to Web contents and the interaction with Web sites is becoming one of
the most important issues in Internet. Servers need to provide certain levels of security so …

DoX: A peer-to-peer antidote for DNS cache poisoning attacks

L Yuan, K Kant, P Mohapatra… - 2006 IEEE international …, 2006 - ieeexplore.ieee.org
The mapping service provided by the Domain Name System (DNS) is fundamental not only
to the health of the Internet but also to the protection and integrity of the data. Recently, the …