Multilevel Cryptography Scheduler

Download Now
Provided by: Reed Elsevier
Topic: Security
Format: PDF
"Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that allowed both uniform and efficient use of this new type of resource. The authors have implemented the operating system service in Windows environment as Scheduler which automatically starts when operating system boots. As system always gives priority to hardware, kernel and applications in order, they have designed the scheduler which schedules the encryption requests at hardware, kernel and application level respectively."
Download Now

Find By Topic