Browsing by Subject "Cryptography"
Now showing items 1-5 of 5
-
Classification of quantum cryptography
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ... -
Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not ... -
Performance analysis of TCP over enhanced UMTS network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)The increase in demand and overwhelming response of 3G mobile networks has made it a technology which would drive the future of mobile communication. On the other hand the popularity of the Internet has also increased with ... -
Secure and efficient key assignment scheme for dynamic access control in a hierarchy
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ... -
Technique to improve revocation mechanism and enhancement of CA's services
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Public Key Cryptography [PKC] is becoming popular in the world of security because of its promising features like authentication and non-repudiation along with integrity and data confidentiality. It has been possible to ...