Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Vivek Kapoor

Design & Implementation of Hybrid Cryptographic Technique using AES &
Data security and network security is a crucial domain of research and development. On the other hand the computing changes their face and at the same ways the attackers and intruders are also aware about the traditional security techniques. Thus new kind of security is required to find that are not accurately from the traditional backgrounds. But the traditional cryptographic models are computationally cost effective, produce additional storage overheads, and also generate the less secure cipher for storage. Therefore in order to resolve the issues in cryptographic security a new methodology is required to develop. We have successfully implemented this hybrid approach in .NET environment. Our experimental results demonstrate the effectiveness and efficiency of our technique and ensure security by means of authentication, confidentiality and integrity. Additionally to make obvious performance of anticipated technique the comparative performance study with the traditional RSA algorithm is performed. Results illustrate the effectiveness of this anticipated technique with respect to traditional RSA algorithm.
Genetic Algorithms and Applications for Stock Trading Optimization
Genetic algorithms (GAs) are based on Darwin's theory of natural selection and survival of the fittest. They are designed to competently look for solutions to big and multifaceted problems. Genetic algorithms are wide groups of interrelated events with divided steps. Each step has dissimilarities, which leads to a broad range of connected actions. Genetic algorithms are used to improve trading systems, such as to optimize a trading rule or parameters of a predefined multiple indicator market trading system. Genetic Algorithms and Applications for Stock Trading Optimization is a complete reference source to genetic algorithms that explains how they might be used to find trading strategies, as well as their use in search and optimization. It covers the functions of genetic algorithms internally, computer implementation of pseudo-code of genetic algorithms in C++, technical analysis for stock market forecasting, and research outcomes that apply in the stock trading system. This book is ideal for computer scientists, IT specialists, data scientists, managers, executives, professionals, academicians, researchers, graduate-level programs, research programs, and post-graduate students of engineering and science.
Genetic Algorithms and Applications for Stock Trading Optimization
Genetic algorithms (GAs) are based on Darwin's theory of natural selection and survival of the fittest. They are designed to competently look for solutions to big and multifaceted problems. Genetic algorithms are wide groups of interrelated events with divided steps. Each step has dissimilarities, which leads to a broad range of connected actions. Genetic algorithms are used to improve trading systems, such as to optimize a trading rule or parameters of a predefined multiple indicator market trading system. Genetic Algorithms and Applications for Stock Trading Optimization is a complete reference source to genetic algorithms that explains how they might be used to find trading strategies, as well as their use in search and optimization. It covers the functions of genetic algorithms internally, computer implementation of pseudo-code of genetic algorithms in C++, technical analysis for stock market forecasting, and research outcomes that apply in the stock trading system. This book is ideal for computer scientists, IT specialists, data scientists, managers, executives, professionals, academicians, researchers, graduate-level programs, research programs, and post-graduate students of engineering and science.
Hybrides Kryptographiemodell auf der Grundlage von Authentifizierung, Integrität und Datenschutz
Informationssicherheit ist eine der ultimativen gro z gigen Bef rchtungen in jedem Revier der heutigen Zeit. Um die ber den mehrdeutigen Weg bertragenen Daten zu sch tzen, werden fr her zahlreiche kryptographische Verfahren durchgef hrt. Doch die gegenw rtig eingesetzten asymmetrischen und symmetrischen Verschl sselungsverfahren weisen mehrere Grenzen auf. Die Schl sseltransaktion ist ein Hauptvergehen der symmetrischen kryptographischen Techniken durch schnelleres Verschl sseln. Um die grundlegenden Sicherheitsdienste wie Authentifizierung, Integrit t und Vertraulichkeit zu erreichen, werden in diesem hybriden Modell Message Digest, Verschl sselungsmethoden bzw. digitale Signaturen verwendet, und ein digitaler Umschlag ist ebenfalls enthalten, der all dies beinhaltet, um sie sicher ber die Verbindung zu bertragen. Wir haben einen hybriden Algorithmus vorgeschlagen, der im Vergleich zu anderen Algorithmen weniger Zeit in Anspruch nehmen kann. Wir bieten auch mehr Sicherheit im Vergleich zu anderen Techniken.
Modèle de cryptographie hybride basé sur l'authentification, l'intégrité et la confidentialité.
La s curit de l'information est l'une des appr hensions les plus g n reuses dans chaque secteur de l' poque actuelle. Afin de prot ger les donn es diffus es sur le passage ambigu, de nombreuses proc dures cryptographiques ont t mises en place. Mais plusieurs limites sont pr sentes dans les proc dures de cryptage asym triques et sym triques actuelles. La transaction de la cl est l'un des principaux d fauts des techniques de cryptographie sym trique, car elle est plus rapide dans le chiffrement. Pour r aliser les services de s curit embryonnaires comme l'authentification, l'int grit et la confidentialit dans ce mod le hybride, des m thodes de cryptage et de signature num rique sont respectivement utilis es et une enveloppe num rique est galement incorpor e qui implique tout cela pour les transf rer en toute confiance sur la connexion. Nous proposons ce type d'algorithme hybride qui peut prendre moins de temps par rapport aux autres algorithmes actuels. Nous fournissons galement plus de s curit par rapport aux autres techniques.
Modello di crittografia ibrida basato su autenticazione, integrità e privacy

Modello di crittografia ibrida basato su autenticazione, integrità e privacy

Vivek Kapoor; Saurabh Bhat

International Book Market Service Ltd
2022
pokkari
La sicurezza delle informazioni una delle preoccupazioni pi generose in ogni ambito dell'epoca attuale. Per proteggere i dati trasmessi attraverso un passaggio ambiguo, in passato sono state messe in atto numerose procedure crittografiche. Tuttavia, le procedure di crittografia asimmetrica e simmetrica presentano diversi limiti. La transazione della chiave una delle principali cause delle tecniche crittografiche simmetriche, in quanto pi rapida nella cifratura. Per ottenere servizi di sicurezza embrionali come l'autenticazione, l'integrit e la riservatezza, in questo modello ibrido vengono utilizzati rispettivamente il message digest, i metodi di crittografia e la firma digitale, oltre a un involucro digitale che coinvolge tutti questi elementi per trasferirli con sicurezza attraverso la connessione. Abbiamo proposto questo tipo di algoritmo ibrido che pu richiedere meno tempo rispetto agli altri algoritmi attuali. Inoltre, forniamo una maggiore sicurezza rispetto ad altre tecniche.
Modelo de Criptografia Híbrido baseado na Autenticação, Integridade e Privacidade

Modelo de Criptografia Híbrido baseado na Autenticação, Integridade e Privacidade

Vivek Kapoor; Saurabh Bhat

International Book Market Service Ltd
2022
pokkari
A seguran a da informa o uma das maiores apreens es generosas em cada relvado do per odo actual. A fim de proteger a transmiss o de dados sobre a passagem amb gua, s o realizados procedimentos criptogr ficos anteriormente abundantes. Mas v rios limites presentes nos actuais procedimentos de encripta o assim trica e sim trica. A transac o chave um delinquente principal das t cnicas criptogr ficas sim tricas atrav s de uma cifragem mais r pida. Para alcan ar os servi os de seguran a embrion ria como autentica o, integridade e confidencialidade neste modelo h brido de digest o de mensagens, s o utilizados m todos de encripta o e assinatura digital respectivamente, e tamb m incorporado um envelope digital que envolve tudo isto para os transferir com confian a atrav s da liga o. -nos proposto o algoritmo de tipo h brido que pode demorar menos tempo em compara o com outros algoritmos actuais. Estamos tamb m a proporcionar mais seguran a em compara o com outras t cnicas.