deshanjali diyasenaWEB APIAPI stands for Application Programming Interface. So, a web API as the name suggests is an API that can be accessed over the web using the…Oct 25, 2020Oct 25, 2020
deshanjali diyasenaSecure Digest FunctionsIn the cryptography world, digest functions are also known as hashing algorithms. Hashing is a method that encrypts data into a unique…Jul 29, 2020Jul 29, 2020
deshanjali diyasenaPublic key Algorithms in CryptographyPublic key algorithms are also known as asymmetric key algorithms which typically uses a key length of 512 to 4096 bits key size. This…Jul 29, 2020Jul 29, 2020
deshanjali diyasenaSecret key Algorithms in CryptographySecret key algorithms are also known as symmetric key as well as shared-key algorithms. A secret key is shared between sender and receiver…Jul 29, 2020Jul 29, 2020
deshanjali diyasenaJAVA — RMIRemote Method Invocation (RMI) is a technology that enables to communicate between java virtual machines and invoke methods among them…Jul 12, 2020Jul 12, 2020
deshanjali diyasenaJAX-WS RPC MethodRPC (remote procedure calls) comes under as a method to develop JAX-WS which stands for Java API for XML web services. It is a standard…Jul 12, 2020Jul 12, 2020
deshanjali diyasenaExternal data representation and marshallingData at language level are stored in data structures. As well as at TCP/UDP level, data are communicated as ‘messages’ or streams of bytes…Jun 21, 2020Jun 21, 2020