Loading

Symmetric Encryption and Scatter/Gather I/O Using KAMWEB
G. Michael1, K. Sivaraman2, B. Sundar Raj3

1G. Michael, Department of Computer Science and Engineering, Bharath Insitute of Higher Education and Research, Chennai (Tamil Nadu), India.
2K. Sivaraman, Department of Computer Science and Engineering, Bharath Insitute of Higher Education and Research, Chennai (Tamil Nadu), India.
3B. Sundar Raj, Department of Computer Science and Engineering, Bharath Insitute of Higher Education and Research, Chennai (Tamil Nadu), India.
Manuscript received on 17 August 2019 | Revised Manuscript received on 08 September 2019 | Manuscript Published on 17 September 2019 | PP: 707-710 | Volume-8 Issue-2S8 August 2019 | Retrieval Number: B14720882S819/2019©BEIESP | DOI: 10.35940/ijrte.B1472.0882S819
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Recent advances in optimal algorithms and vir-tual configurations are always at odds with write-ahead logging. After years of unfortunate research into 32 bit architectures, we show the evaluation of sensor networks. In order to solve this grand challenge, we concentrate our efforts on validating that virtual machines and sensor networks can agree to realize this objective.
Keywords: Encryption, Scatter, Gather.
Scope of the Article: Encryption Methods and Tools