Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1829
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWaziri, Victor Onomza-
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorDanladi, Hakimi-
dc.date.accessioned2021-06-07T07:51:57Z-
dc.date.available2021-06-07T07:51:57Z-
dc.date.issued2015-04-
dc.identifier.citationhttp://research.ijcaonline.org/volume115/number23/pxc3902146.pdfen_US
dc.identifier.issn0975 – 8887-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1829-
dc.description.abstractThis paper dwells theoretically on the application of Elliptic Curves Cryptography (ECC) for the web and Cloud and Cloud Computing environments. ECC is still in its embryonic utility formation unlike the RSA that has gained much ground in its application on the web security as it offers extensive applications to the various aspects of authentications, e commerce and mobile phones; but it consumes a lot of power that may not be useful to Smartphones in the context of Mobile cloud computing. Notwithstanding, there is some remarkable deployment of ECC for web security currently on going This paper establishes the position and role of ECC in the web computing environment. A general introduction to the web and security threats emerging from the use of the web is discussed. Different types of security protocols on the web (IPSec, SSL/TLS and SSH) are discussed. The paper expounds how ECC is deployed on the SSL/TLS protocol-the dominant security protocol on the web- to contain the adversaries. Moreover, we made an effort to discover why people may make the choice of ECC over other cryptographic systems like RSA and discrete logarithm cryptographic systems. Finally, with the hype in mobile Cloud Computing, the paper discusses the security implementations how ECC is applied on Digital Signatureen_US
dc.language.isoenen_US
dc.publisherInternational Journal of Computer Applicationsen_US
dc.relation.ispartofseriesVolume 115 Number 23;-
dc.subjectPublic-key cryptography, Elliptic Curve Cryptography (ECC), Web security, Secure Socket Layer (SSL), Cloud computingen_US
dc.titleWeb-based Security Services based-on Elliptic Curves Cryptosystemen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Web cloud based security service.pdf49.98 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.