Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Essays On Conflict And Organisation Theory., Dushyant Kumar Dr.
Essays On Conflict And Organisation Theory., Dushyant Kumar Dr.
Doctoral Theses
Throughout the human civilization, domestic (intra country) conflicts have been present across societies, cultures and countries. These conflicts are extremely common as well as persistent. For the period 1960-2006, twenty percent of the countries have experienced at-least ten years of conflicts with more than 1000 casualties per year (Blattman and Miguel, 2010). It causes huge loss of human life, quantitatively, as well as qualitatively. It results in huge number of casualties, as well as damage to the existing output, resources and infrastructure. The persistent presence of such conflicts across the world means that a significant number of people as well …
Efficient And Adaptively Secure Constructions Of Identity-Based Cyrptographic Primitives., Somindu Chaya Ramanna Dr.
Efficient And Adaptively Secure Constructions Of Identity-Based Cyrptographic Primitives., Somindu Chaya Ramanna Dr.
Doctoral Theses
Public-key encryption (PKE) is an elegant solution to the fundamental problem of cryptography – secure communication between two parties over a public (insecure) channel. The basic idea is that every user A holds two keys – a public key (PKA) and a secret key (SKA). A user who wants to send a message to A encrypts it with PKA and sends the resulting ciphertext along the public channel. A, at the other end of the channel, decrypts the ciphertext using SKA and obtains the message. SKA is known to user A alone. Any third party intercepting data on the public …
Application Of Combinatorial Structures In Wireless Communication., Samiran Bag Dr.
Application Of Combinatorial Structures In Wireless Communication., Samiran Bag Dr.
Doctoral Theses
Wireless communication has a compelling need in today’s world. This need is driven by the sudden surge in the demand of ad-hoc networks like wireless sensor networks. These networks consist of many isolated devices called nodes that use the wireless medium for communication. There are three security notions attached to any wireless communication. These are data confidentiality, data integrity and data availability. Cryptographic protocols are required for achieving the first two notions which in turn require shared secret keys. The last notion viz. data availability mainly deals with protecting the data from ‘denial of service attack’.In this thesis, we apply …