Parllel algorithms for symmetric key infrastructure based security techniques
| dc.contributor.guide | Dr. Bhanu Kapoor | en_US |
| dc.coverage.spatial | en_US | |
| dc.creator.researcher | Disha Handa | en_US |
| dc.date.accessioned | 2015-08-12T06:24:34Z | |
| dc.date.available | 2015-08-12T06:24:34Z | |
| dc.date.awarded | 2015 | en_US |
| dc.date.completed | 12/2014 | en_US |
| dc.date.issued | 2015-08-12 | |
| dc.date.registered | 1-7-2010 | en_US |
| dc.description.abstract | Parallel computing involves simultaneous use of multiple compute resources to solve a large computational problem In the real world applications many of the tasks can be executed in parallel Parallel computing is being used in diverse areas that range from computational simulations for technical and engineering problems to marketable applications in transaction processing and data mining The performance and energy benefits of parallelism are key drivers for the growth in parallel computing newline | en_US |
| dc.description.note | en_US | |
| dc.format.accompanyingmaterial | DVD | en_US |
| dc.format.dimensions | en_US | |
| dc.format.extent | en_US | |
| dc.identifier.uri | http://hdl.handle.net/10603/46758 | |
| dc.language | English | en_US |
| dc.publisher.institution | Department of Computer Science and Engineering | en_US |
| dc.publisher.place | Pinjore | en_US |
| dc.publisher.university | Chitkara University | en_US |
| dc.relation | en_US | |
| dc.rights | university | en_US |
| dc.source.university | University | en_US |
| dc.title | Parllel algorithms for symmetric key infrastructure based security techniques | en_US |
| dc.title.alternative | en_US | |
| dc.type.degree | Ph.D. | en_US |