Now showing items 1-5 of 5

    • Classification of quantum cryptography 

      Acharya, Jaykumari (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ...
    • Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks 

      Vasavada, Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not ...
    • Performance analysis of TCP over enhanced UMTS network 

      Mathur, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      The increase in demand and overwhelming response of 3G mobile networks has made it a technology which would drive the future of mobile communication. On the other hand the popularity of the Internet has also increased with ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Technique to improve revocation mechanism and enhancement of CA's services 

      Thacker, Grishma D. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Public Key Cryptography [PKC] is becoming popular in the world of security because of its promising features like authentication and non-repudiation along with integrity and data confidentiality. It has been possible to ...