[PDF][PDF] Effect of parallelization, execution time and inter process communication on sorting techniques using Message Passing Interface

D Gaurav, S Arora, P Gupta - International Journal of Computer …, 2014 - academia.edu
The aim of this paper if to show that the great part of the execution time is consumed in
computations. So as the number of processors increase, the amount of work done by each …

Integrity and Privacy through Authentication Key Exchange Protocols for Distributed Systems

B Usharani - Asian Journal of Engineering and Applied Technology, 2017 - ajeat.com
Networking is the practice of connecting several computing devices together in order to
share resources. In real world, attacks via force and fraud are privacy (unauthorized release …

[PDF][PDF] MULTI-SERVER AUTHENTICATION KEY EXCHANGE APPROACH IN BIGDATA ENVIRONMENT

MK More, J Raghatwan - 2017 - academia.edu
The key establishment difficulty is the maximum central issue and we learn the trouble of key
organization for secure many to many communications for past several years. The trouble is …