Affiliation:
1. Birla Institute of Technology, India
Abstract
Distributed computing is one of the thrust areas in the field of computer science, but when we are concerned about security a question arises, “Can it be secure?” From this note, the authors start this chapter. In the distributed environment, when the system is connected to a network, and the operating system firewall is active, it will take care of all the authentication and access control requests. There are several traditional cryptographic approaches which implement authentication and access control. The encryption algorithms such as Rijndael, RSA, A3, and A5 is used for providing data secrecy. Some of the key distribution techniques have been discussed such as Diffie Hellman key exchange for symmetric key, and random key generation (LCG) technique is used in red-black tree traversal which provides the security of the digital contents. The chapter deals with the advanced versions of the network security techniques and cryptographic algorithms for the security of multimedia contents over the internet.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6;Advances in Library and Information Science;2023-06-30
2. Novel Library Innovations and Advancements After the COVID-19 Pandemic Era;Advances in Library and Information Science;2023-06-30
3. The Nexus of War, Violence, and Rights;Advances in Digital Crime, Forensics, and Cyber Terrorism;2023-05-05
4. Voice-Based Speaker Identification and Verification;Advances in Library and Information Science;2021
5. The Detection of SQL Injection on Blockchain-Based Database;Revolutionary Applications of Blockchain-Enabled Privacy and Access Control;2021