Securable Network in three-party Protocols
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP
**

Posts: 226
Joined: Jul 2009
#1
28-08-2009, 02:11 AM


Securable Network in three-party Protocols

Abstract

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two mediator protocols, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-in-the-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.


















SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
Clock Speed : 700 MHZ
RAM : 128 MB
Monitor : 14 SVGA Digital Color Monitor
Keyboard : 107 Keys Keyboard
Floppy Drive : 1.44MB
Compact Disk Drive : 700MB
Hard Disk : 20GB
Printer : Canon BJC 2100 SP
Mouse : Logitech Mouse


SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
abhishekcs1
Active In SP
**

Posts: 3
Joined: Jul 2010
#2
23-07-2010, 04:51 PM

plz send report and ppt
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,745 09-12-2014, 09:25 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Comparing AODV and OLSR Routing Protocols. seminar projects maker 0 341 26-09-2013, 02:19 PM
Last Post: seminar projects maker
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 467 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  The Content-Based Image Retrieval using the Pulse Coupled Neural Network PPT seminar projects maker 0 546 14-09-2013, 01:58 PM
Last Post: seminar projects maker
  AUTOMATED BUSINESS INTELLIGENCE NETWORK FOR SOFTWARE REQUIREMENT SPECIFICATIONS seminar projects maker 0 430 12-09-2013, 03:46 PM
Last Post: seminar projects maker
  The Awareness Network PPT project girl 1 588 02-09-2013, 01:43 PM
Last Post: Guest
  A Study on Topological Characteristics of Wireless Sensor Network pdf study tips 0 401 30-08-2013, 04:57 PM
Last Post: study tips
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 429 29-08-2013, 02:15 PM
Last Post: study tips
  Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols pdf study tips 0 346 20-08-2013, 03:43 PM
Last Post: study tips