Cryptographic protocol

Sort By:
Page 4 of 50 - About 500 essays
  • Better Essays

    Taking a Look at Bitcoin

    • 2739 Words
    • 11 Pages

    Introduction I thought of writing a paper on Bitcoin because this is a very interesting topic and everyone tries to get into it, I will try to make this topic understandable by writing it in laymen’s language. Thanks to Professor Dr. Burnham who has given me this opportunity to write a paper on Bitcoin. According to the name of Bitcoin when we first hear this word “Bitcoin” we create image in our mind that there would be some coin kind of thing but there is no coin it is only a digital currency.

    • 2739 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Lab Answers Essay

    • 618 Words
    • 3 Pages

    Rodney L. Bennett Jr ISSC362 Week 1 Lab #2: Implement Hashing and Encryption for Secure Communications Instructor Name: _Adam Meyer_ Lab Assessment Questions 1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The hash file is changed when the data is modified because the information within the file has changed and it is considered a new/different file. 2.

    • 618 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    and stance you take on this is completely your prerogative. “Consensus-Currencies” in Kraken’s Currency Trading Platform In this short essay, I argue that Kraken should err in favor of including crypto- currencies based on “decentralized consensus protocols” into its currency-trading platform. For the sake of brevity, I will refer to these crypto-currencies as “consensus-currencies” (e.g. Stellar, Ripple etc.). In making this argument, I am seeking to strike a balance between illustrating my understanding

    • 1261 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A review On Dynamo: Amazon’s Highly Available Key-value Store SUMMARY: An e-commerce website must have requirements such as performance, reliability, efficiency and high scalability for an efficient functioning. Out of these requirements, reliability is the most challenging requirement to be satisfied as a small outage can lead to a large financial consequences and affect the customer trust. This paper gives insight into the design and implementation of dynamo, a key value store that throws light

    • 1665 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Files data is divided into equal data blocks. In advance storing the data blocks on cloud servers, user pre-computes the verification tokens. These tokens are used to check the integrity of data stored on cloud servers. Also these tokens are used to locate the cloud server on which data has been changed by the attacker. Before data division and dispersing file consumer generates tokens on individual data blocks. When consumer wants to check the correctness of the data, he sends the file identifier

    • 883 Words
    • 4 Pages
    Better Essays
  • Decent Essays

    The algorithm is executed by the owner to encrypt the plaintext of $D$ as follows: \begin {enumerate} \item [1:]for each document $D_i \in D$ for $i \in [1,n]$ do \item [2:]encrypt the plaintext of $D_i$ using also $\textit{El Gamal}$ cipher under $\textit{O's}$ private key $a$ and $\textit{U's}$ public key $U_{pub}$ as $Enc_{D_i}= U_{pub}^a \times D_i $ \item [3:]end for \item[4:] return $\textit{EncDoc}$ \end{enumerate} \subsubsection{\textit{\textbf {Retrieval phase}}} Include three algorithms

    • 461 Words
    • 2 Pages
    Decent Essays
  • Better Essays

    VoIP: A New Frontier for Security and Vulnerabilities Introduction to Voice over IP Technology      The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage (http://www.vonage.com/) and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate is often less than it would cost for a regular phone line

    • 2715 Words
    • 11 Pages
    Better Essays
  • Better Essays

    IPV4 Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP) and it is only protocol widely used for the communication purpose in the computer networks and it works in the Internet layer of the OSI reference model. The IPv4 address is 32 bits long. The 32 bit is divided into four groups. Each group has the eight bits which forms as an octet. Each IP address has two parts called the network id and the host id. This IP address is used as a unique identification address

    • 3888 Words
    • 16 Pages
    Better Essays
  • Decent Essays

    Week 3 Ntc 362 Essay

    • 648 Words
    • 3 Pages

    Pauley The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they

    • 648 Words
    • 3 Pages
    Decent Essays
  • Better Essays

    in Wi-Fi and WiMAX is that WiMAX has an effective distance of up to 90km while Wi-Fi only has a range of up to 100m and data rates on WiMAX is up to 40mbps compared to Wi-Fi with up to 54mbps. Next layer 3 the Network layer is where the Internet Protocol (IP) will take place and be defined. There are two options to use here IPv4 or IPv6.

    • 4244 Words
    • 17 Pages
    Better Essays