Secure autonomic communication using RSA algorithm

被引:0
|
作者
Chittala, Aarti
Mummini, Preethi
Verma, P. Suresh
机构
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The goal of autonomic computing is to make systems work smarter, not harder. Using biological systems as inspiration, autonomic computing takes the nervous system as a systemic model. The autonomic system reacts instantly to changing demands, environments, threats, and injuries in appropriate ways. And it does precisely what is required in these specific circumstances without the need for conscious recognition or action. IBMs autonomic computing initiative seeks to apply this model to the ways system and application vendors design computing solutions, removing or drastically reducing the need for human intervention. In this paper we studied and analyzed RSA algorithm for autonomic Communication over a secure channel.
引用
收藏
页码:76 / 79
页数:4
相关论文
共 50 条
  • [1] Image Steganography using RSA Algorithm for Secure Communication
    Preksha, B.
    Harish, Rishika
    Sreenivas, B.
    Vasanthalakshmi, M.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [2] An optimised homomorphic CRT-RSA algorithm for secure and efficient communication
    Abid R.
    Iwendi C.
    Javed A.R.
    Rizwan M.
    Jalil Z.
    Anajemba J.H.
    Biamba C.
    [J]. Personal and Ubiquitous Computing, 2023, 27 (3) : 1405 - 1418
  • [3] Retraction Note: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication
    Rabia Abid
    Celestine Iwendi
    Abdul Rehman Javed
    Muhammad Rizwan
    Zunera Jalil
    Joseph Henry Anajemba
    Cresantus Biamba
    [J]. Personal and Ubiquitous Computing, 2024, 28 (Suppl 1) : 23 - 23
  • [4] ACAFP: Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication. A Review on RSA Algorithm
    Chaudhury, Punit
    Dhang, Susmita
    Roy, Monpreet
    Deb, Saurav
    Saha, Jyotirmoy
    Mallik, Aditya
    Bal, Sauvik
    Roy, Saraswata
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    Das, Rupayan
    [J]. 2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 332 - 337
  • [5] A secure and efficient public auditing scheme using RSA algorithm for cloud storage
    Zhiyan Xu
    Libing Wu
    Muhammad Khurram Khan
    Kim-Kwang Raymond Choo
    Debiao He
    [J]. The Journal of Supercomputing, 2017, 73 : 5285 - 5309
  • [6] A secure and efficient public auditing scheme using RSA algorithm for cloud storage
    Xu, Zhiyan
    Wu, Libing
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. JOURNAL OF SUPERCOMPUTING, 2017, 73 (12): : 5285 - 5309
  • [7] Chua's Oscillator-Based RSA Algorithm With Authenticated Masked Public Key for Secure Communication
    Sharma, Navneet
    Kumar, Pravindra
    Rai, Shireesh Kumar
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (04) : 1124 - 1132
  • [8] Secure transit of confidential documents over Internet using high speed RSA algorithm
    Avadhani, PS
    Chalamaiah, N
    Roja, PP
    [J]. International Conference on Computing, Communications and Control Technologies, Vol 4, Proceedings, 2004, : 74 - 78
  • [9] Secure Message Transfer using RSA algorithm and Improved Playfair cipher in Cloud Computing
    Hemanth, Naga P.
    Raj, Abhinay N.
    Yadav, Nishi
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 931 - 936
  • [10] SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS USING RSA ALGORITHM
    Sankaranarayanan, S.
    Murugaboopathi, G.
    [J]. 2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 354 - 357