Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/9392
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lal, Anubhav Kumar | - |
dc.date.accessioned | 2014-11-19T08:06:58Z | - |
dc.date.available | 2014-11-19T08:06:58Z | - |
dc.date.issued | 1996 | - |
dc.identifier | M.Tech | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/9392 | - |
dc.guide | Sarje, A. K. | - |
dc.description.abstract | For computer network security cryptography is used. In any hierarchical organization the confidentiality of the data transmitted over the network should be maintained but it may be necessary for a vigilant senior to prevent his subordinates from indulging in activities that may be harmful for the organization. In this dissetation a security scheme is proposed as a solution to the above problem such that any communication over the network by a user can be kept secret from all others but not from his seniors. This scheme can be implemented with any public key cryptosystem. It does not require the involvement of senior for each communication, but. it is for convenience of the senior to check any communication when he feels so. Moreover the scheme serves not only the immediate seniors but all the seniors in the hierarchy without involvement of any of the intermediate users in the hierarchy. The effectiveness of the proposed scheme has been demonstrated by implementing it on LAN. | en_US |
dc.language.iso | en | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.title | A COMPUTER NETWORK SECURITY SCHEME FOR A HIERARCHICAL ORGANIZATION | en_US |
dc.type | M.Tech Dessertation | en_US |
dc.accession.number | 247079 | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ECD247079.pdf | 2.58 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.