A survey on edge performance benchmarking

B Varghese, N Wang, D Bermbach, CH Hong… - ACM Computing …, 2021 - dl.acm.org
Edge computing is the next Internet frontier that will leverage computing resources located
near users, sensors, and data stores to provide more responsive services. Therefore, it is …

Optimizing public-key encryption for wireless clients

NR Potlapally, S Ravi, A Raghunathan… - … . ICC 2002 (Cat. No …, 2002 - ieeexplore.ieee.org
Providing acceptable levels of security imposes significant computational requirements on
wireless clients, servers, and network elements. These requirements are often beyond the …

The impact of cloud computing technology on legal infrastructure within internet—focusing on the protection of information privacy

FC Cheng, WH Lai - Procedia Engineering, 2012 - Elsevier
The main purpose of this article is to focus on the issue of protecting information privacy
through the newly developed cloud computing technology. This article will first introduce the …

Distributed ledger technology based integrated healthcare solution for Bangladesh

MA Islam, MA Islam, MAH Jacky, M Al-Amin… - IEEE …, 2023 - ieeexplore.ieee.org
Healthcare data is highly sensitive and must be safeguarded. Personal and sensitive data,
such as names and addresses, is stored in Encrypted Electronic Health Records (EHRs) …

[KNIHA][B] Public key cryptography: applications and attacks

LM Batten - 2013 - books.google.com
Complete coverage of the current major public key cryptosystems their underlying
mathematics and the most common techniques used in attacking them Public Key …

[PDF][PDF] A novel approach to load balancing and cloud computing security using SSL in IaaS environment

B Mukhopadhyay, R Bose, S Roy - International Journal, 2020 - academia.edu
Cloud computing service providers (CCSP) are constantly at risk of suffering from
performance loss. Cloud computing infrastructure allows users to rent computing resources …

[PDF][PDF] An overview of secure sockets layer

DSM Charjan, PSM Bochare… - Int. J. Comput. Sci …, 2013 - researchpublications.org
In recent years, there has been tremendous development in Internet. Right from retrieving
information about any subject, you can use Internet for many purposes. But when two parties …

Anatomy and performance of SSL processing

L Zhao, R Iyer, S Makineni… - … on Performance Analysis …, 2005 - ieeexplore.ieee.org
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business
applications require the exchange of data to be highly secure. The Secure Sockets Layer …

Techniques for efficient security processing

A Raghunathan, S Ravi, N Potlapally… - US Patent App. 10 …, 2003 - Google Patents
0001. This application claims priority from co-pending US Provisional Patent Application
Serial No. 60/325,189 filed Sep. 28, 2001; No. 60/342,748 filed Dec. 28, 2001 and No …

Characterizing secure dynamic web applications scalability

J Guitart, V Beltran, D Carrera, J Torres… - 19th IEEE …, 2005 - ieeexplore.ieee.org
Security in the access to Web contents and the interaction with Web sites is becoming one of
the most important issues in Internet. Servers need to provide certain levels of security so …