Deploying Applications in Azure Cloud ServiceThe article is as an requirement of course SENG 41283 : Distributed and Cloud Computing and link…Aug 16, 2020Aug 16, 2020
Secure digest functionsThe recent advances in cryptanalysis of hash functions have been spectacular, and the collision attacks on MD5 and SHA-1 are of particular…Jul 24, 2020Jul 24, 2020
Public key Algorithms in CryptographyIn asymmetric key cryptography different keys are used for encryption and decryption, hence also known as public key encryption. The two…Jul 24, 2020Jul 24, 2020
Secret key Algorithms in CryptographyData security is very important in wireless network and for this cryptography plays a crucial role which means “secret writing”. In…Jul 24, 2020Jul 24, 2020
Remote Method Invocation(RMI) with javaRMI stands for Remote Method Invocation. It is a mechanism that allows an object residing in one system (JVM) to access/invoke an object…Jul 17, 2020Jul 17, 2020
External data representation and marshallingExternal Data Representation (XDR) is a standard data serialization format, for uses such as computer network protocols. It allows data to…Jun 20, 2020Jun 20, 2020