First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2009-10-26 20:48:56Open Document File Size: 102,61 KBShare Result on FacebookCityVenice / Pittsburgh / /CompanyAES / Distributed Brokering Systems / BouncyCastle / /CountryItaly / / /FacilityUniversity Address Line / Indiana University / /IndustryTermtransportation / implemented cryptography algorithms / Web Services Security Hongbin Liu Shrideep Pallickara Geoffrey Fox Indiana University Address Line / service invocation chain / low resolution timing1 machinery / compositional services / transportation paradigm / derivation algorithm / communication protocol / Wireless Communications / symmetric encryption algorithms / Web services security specifications / wire transportation / phash algorithm / c14n processing / Web services project / point-to-point solution / Web services security performances / security processing time / cryptography algorithms / encryption algorithms / end services / receiver processing / Web Service Security Abstraction / Web services security / Web services / /OperatingSystemLinux / Windows XP / Microsoft Windows / /OrganizationIndiana University / Community Grid Lab / /ProgrammingLanguageJava / XML / /ProvinceOrStateIndiana / Pennsylvania / /TechnologyXML / encryption algorithms / Linux / Wireless Communications / existing technologies / VPN / data encryption / CORBA / Operating system / SSL / implemented cryptography algorithms / cryptography algorithms / two algorithms / encryption / cryptography / Symmetric encryption / Java / firewall / phash algorithm / symmetric encryption algorithms / key derivation algorithm / communication protocol / DOM / Digital Signature / Document Object Model / existing XML Digital Signature / /URLhttp /SocialTag |