Distributed Consensus: Definition & Properties of Consensus, Steps & Fault-Tolerance in Consen. ALG.
Dr Nitin Naik - Aston University, UK
Distributed Consensus: Definition & Properties of Consensus, Steps & Fault-Tolerance in Consen. ALG.
9:20
ChatGPT Failed the First Exam But…
Dr Nitin Naik - Aston University, UK
ChatGPT Failed the First Exam But…
6:15
Vector Clocks for Ordering of Events in Distributed Systems
Dr Nitin Naik - Aston University, UK
Vector Clocks for Ordering of Events in Distributed Systems
9:35
Lamport’s Logical Clocks for Ordering of Events in Distributed Systems
Dr Nitin Naik - Aston University, UK
Lamport’s Logical Clocks for Ordering of Events in Distributed Systems
7:16
Ordering of Events: Logical Time and Logical Clock, Happened-Before Relationship, Causality
Dr Nitin Naik - Aston University, UK
Ordering of Events: Logical Time and Logical Clock, Happened-Before Relationship, Causality
12:50
Network Time Protocol (NTP) for Clock Synchronization
Dr Nitin Naik - Aston University, UK
Network Time Protocol (NTP) for Clock Synchronization
6:56
Berkeley’s Algorithm for Clock Synchronization
Dr Nitin Naik - Aston University, UK
Berkeley’s Algorithm for Clock Synchronization
7:10
Cristian’s Algorithm for Clock Synchronization
Dr Nitin Naik - Aston University, UK
Cristian’s Algorithm for Clock Synchronization
5:09
Time and Clocks: Quartz Clock, Atomic Clock, Definition of Second, TAI, UTC, What is a Leap Second?
Dr Nitin Naik - Aston University, UK
Time and Clocks: Quartz Clock, Atomic Clock, Definition of Second, TAI, UTC, What is a Leap Second?
9:53
Peer-to-Peer Architectural Model: Overlay Network, Unstructured & Structured P2P, Advtgs & Disadvtgs
Dr Nitin Naik - Aston University, UK
Peer-to-Peer Architectural Model: Overlay Network, Unstructured & Structured P2P, Advtgs & Disadvtgs
8:02
Client-Server Architectural Model: 3-Layer & 3-Tier Architectures, Advantages and Disadvantages
Dr Nitin Naik - Aston University, UK
Client-Server Architectural Model: 3-Layer & 3-Tier Architectures, Advantages and Disadvantages
8:18
What is a Distributed System? Definition, Examples, Benefits, and Challenges of Distributed Systems
Dr Nitin Naik - Aston University, UK
What is a Distributed System? Definition, Examples, Benefits, and Challenges of Distributed Systems
7:31
4 Modular Arithmetic for Cryptography- Part 3: Modular Congruence and its Properties
Dr Nitin Naik - Aston University, UK
4 Modular Arithmetic for Cryptography- Part 3: Modular Congruence and its Properties
7:36
11 Cryptographic Hash Function and its Properties: Pre-image, Second Pre-image, Collision Resistance
Dr Nitin Naik - Aston University, UK
11 Cryptographic Hash Function and its Properties: Pre-image, Second Pre-image, Collision Resistance
8:56
10 Hashing and Hash Function:  Definition, Properties,  Hash Pre-image and Hash Collision Attack
Dr Nitin Naik - Aston University, UK
10 Hashing and Hash Function: Definition, Properties, Hash Pre-image and Hash Collision Attack
8:30
1 Message/Data Confidentiality, Message/Data Integrity, Message/Data Authentication, Non-repudiation
Dr Nitin Naik - Aston University, UK
1 Message/Data Confidentiality, Message/Data Integrity, Message/Data Authentication, Non-repudiation
10:20
2 Modular Arithmetic for Cryptography-Part 1: Modulo, Prime Number, Composite Number, Coprime Number
Dr Nitin Naik - Aston University, UK
2 Modular Arithmetic for Cryptography-Part 1: Modulo, Prime Number, Composite Number, Coprime Number
6:14
3 Modular Arithmetic for Cryptography- Part 2: GCD, Bézout’s Identity, Extended Euclidean Algorithm
Dr Nitin Naik - Aston University, UK
3 Modular Arithmetic for Cryptography- Part 2: GCD, Bézout’s Identity, Extended Euclidean Algorithm
12:37
5 Modular Arithmetic for Cryptography- Part 4:  Totient Function, Euler’s & Fermat’s Little Theorem
Dr Nitin Naik - Aston University, UK
5 Modular Arithmetic for Cryptography- Part 4: Totient Function, Euler’s & Fermat’s Little Theorem
6:37
6 Modular Arithmetic for Cryptography- Part 5: Primitive Root Modulo, A Method to Find & Count it
Dr Nitin Naik - Aston University, UK
6 Modular Arithmetic for Cryptography- Part 5: Primitive Root Modulo, A Method to Find & Count it
9:15
7 Modular Arithmetic for Cryptography-Part 6: Modular Multiplicative Inverse, Extended Euclidean ALG
Dr Nitin Naik - Aston University, UK
7 Modular Arithmetic for Cryptography-Part 6: Modular Multiplicative Inverse, Extended Euclidean ALG
8:17
8 Diffie-Hellman Key Exchange (DHKE) Algorithm
Dr Nitin Naik - Aston University, UK
8 Diffie-Hellman Key Exchange (DHKE) Algorithm
6:49
9 RSA Encryption Algorithm
Dr Nitin Naik - Aston University, UK
9 RSA Encryption Algorithm
13:37