Cryptography is a process that converts ordinary text into cipher text and vice-versa. It is not only protecting the data from theft, but can also be used for user authentication. The large number of slices increases the size of devices. In order to reduce the number of slices, lightweight algorithms are used. Achieving high speed and less memory space are the key issues in lightweight devices usi...Show More
As resource-constrained devices such as RFID and smart cards are being widely developed and used, there is an increase in the need for an efficient lightweight cryptographic algorithm. Elliptic Curve Cryptography is one type of public key cryptography which provides the same level of security when compared to RSA, with a smaller key size. Hence, ECC has many advantages like less area, less power c...Show More
Network Monitoring is a procedure used to monitor a computer network system and notify the network administrator in case of any outages. It is necessary to diagnose and report the issues that would lead to failure or irregularity in the network. The performance and usage of a network can also be monitored. Network monitoring can be done as server and application monitoring. The process of monitori...Show More