2 research outputs found

    Improving key exchange protocols based on sender and receiver electronic identification documents

    Get PDF
    ΠŸΡ€Π΅Π΄ΠΌΠ΅Ρ‚ Ρ€Π°Π΄Π° докторскС Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜Π΅ јС саглСдавањС Π°ΠΊΡ‚ΡƒΠ΅Π»Π½ΠΈΡ… ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ° Π²Π΅Π·Π°Π½ΠΈΡ… Π·Π° појмовС Ρ€Π°Π·ΠΌΠ΅Π½Π° криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° ΠΈ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π° корисника систСма Π·Π° Ρ‚Π°Ρ˜Π½Ρƒ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Ρƒ. Π Π°Π΄ сС Π±Π°Π²ΠΈ Π°Π½Π°Π»ΠΈΠ·ΠΎΠΌ ΠΏΠΎΡΡ‚ΠΎΡ˜Π΅Ρ›ΠΈΡ… Ρ€Π΅ΡˆΠ΅ΡšΠ° Ρƒ области ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° ΠΈ Ρ€Π°Π·Π²ΠΈΡ˜Π°ΡšΠ΅ΠΌ сопствСног систСма Π·Π° Ρ‚Π°Ρ˜Π½Ρƒ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Ρƒ. Научни Ρ†ΠΈΡ™ Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜Π΅ јС ΡƒΠ½Π°ΠΏΡ€Π΅Ρ’Π΅ΡšΠ΅ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° Π½Π° Π±Π°Π·ΠΈ Π»ΠΈΡ‡Π½ΠΈΡ… ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Π°Ρ‚Π°. Π˜Π·Π²Ρ€ΡˆΠ΅Π½Π° јС Π°Π½Π°Π»ΠΈΠ·Π° ΠΏΠΎΡΡ‚ΠΎΡ˜Π΅Ρ›ΠΈΡ… приступа Ρƒ области ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° с Ρ†ΠΈΡ™Π΅ΠΌ Π΄Π° сС ΠΏΠΎΠ±ΠΎΡ™ΡˆΠ° Π½ΠΈΠ²ΠΎ Π·Π°ΡˆΡ‚ΠΈΡ‚Π΅ ΠΏΡ€ΠΈΠ»ΠΈΠΊΠΎΠΌ Ρ‚Π°Ρ˜Π½Π΅ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π΅ ΠΈ добијС основа Π·Π° Ρ€Π°Π·Π²ΠΎΡ˜ сопствСног систСма. КомбиновањСм криптографских ΠΌΠ΅Ρ‚ΠΎΠ΄Π° којС ΠΎΠ±Π΅Π·Π±Π΅Ρ’ΡƒΡ˜Ρƒ повСрљивост, аутСнтичност ΠΈ ΠΈΠ½Ρ‚Π΅Π³Ρ€ΠΈΡ‚Π΅Ρ‚, ΡƒΠ· ΠΏΡ€ΠΈΠΌΠ΅Π½Ρƒ стСганографских ΠΌΠ΅Ρ‚ΠΎΠ΄Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π° Π½Π° скривСн Π½Π°Ρ‡ΠΈΠ½, корисницима ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎΠ³ систСма сС ΠΏΡ€ΡƒΠΆΠ° могућност Π΄Π° Π½Π° Сфикасан ΠΈ сигуран Π½Π°Ρ‡ΠΈΠ½ Ρ€Π°Π·ΠΌΠ΅ΡšΡƒΡ˜Ρƒ Ρ‚Π°Ρ˜Π½Π΅ ΠΏΠΎΡ€ΡƒΠΊΠ΅. Анализом Ρ€Π΅Π·ΡƒΠ»Ρ‚Π°Ρ‚Π° ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° Π·Π°ΠΊΡ™ΡƒΡ‡Π΅Π½ΠΎ јС Π΄Π° ΠΏΠΎΡΡ‚ΠΎΡ˜ΠΈ оправданост ΡƒΠΏΠΎΡ‚Ρ€Π΅Π±Π΅ Π»ΠΈΡ‡Π½ΠΈΡ… ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Π°Ρ‚Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° који сС користС Ρƒ Ρ‚Π°Ρ˜Π½ΠΎΡ˜ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜ΠΈ

    Big Data and Large-scale Data Analytics: Efficiency of Sustainable Scalability and Security of Centralized Clouds and Edge Deployment Architectures

    Get PDF
    One of the significant shifts of the next-generation computing technologies will certainly be in the development of Big Data (BD) deployment architectures. Apache Hadoop, the BD landmark, evolved as a widely deployed BD operating system. Its new features include federation structure and many associated frameworks, which provide Hadoop 3.x with the maturity to serve different markets. This dissertation addresses two leading issues involved in exploiting BD and large-scale data analytics realm using the Hadoop platform. Namely, (i)Scalability that directly affects the system performance and overall throughput using portable Docker containers. (ii) Security that spread the adoption of data protection practices among practitioners using access controls. An Enhanced Mapreduce Environment (EME), OPportunistic and Elastic Resource Allocation (OPERA) scheduler, BD Federation Access Broker (BDFAB), and a Secure Intelligent Transportation System (SITS) of multi-tiers architecture for data streaming to the cloud computing are the main contribution of this thesis study
    corecore