Search or add a thesis

Advanced Search (Beta)
Home > UML based modling of real time industrial control systems

UML based modling of real time industrial control systems

Thesis Info

Author

Kamran Latif

Supervisor

Aamer Nadeem

Department

Department of Software Engineering

Program

MS

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2011

Thesis Completion Status

Completed

Page

74

Subject

Software Engineering

Language

English

Other

MS 005.43 KAU

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676722362406

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

۷۔ لا تفسد فی الارض

لا تفسدو فی الارض

گاڑی کے سائیلنسر سے کرپشن کا دھواں نکلتا ہے

ٹائروں سے چمٹی بے ایمانی کی دھول اڑتی ہے

 گاڑی ٹھہرتی ہے

سیاہ شیشوں میں آنکھیں چھپائے

چہرے پر رعونت کے ماسک لگائے

سر پہ شرافت کی دستار سجائے

نفاق کی تسبیح پر سنگ دلی کے دانے پھینکتے

شیطان باہر آتے ہیں

مسجدوں میں تقویٰ کی نمائش ہوتی ہے

پرہیز گاری کے خول میں چھپے...

سماجی روابط کی ویب سائٹس اور اسلامی تعلیمات

Social website is a platform that allows people to create and share different ideas, information and pictures/videos. Social websites like Facebook, Whatsapp, Twitter, Linked In, Youtube etc, allow users to intract with large number of people. In every field of life, these websites have postive and negative effects. The use of social websites make them good or bad. In this paper, we present an evolution of social websites in the teachings of Islam. Islam doesn’t against the social websites, it only condemns its negative impact or negative use.

Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves

Multicast is an efficient means of information dissemination to a set of nodes. It has low utilization of bandwidth and communication resources as compare to unicast. Secure multicast preserves confidentiality and authenticity of information to legitimate group members, adopted in emerging commercialization of wireless applications. Elliptic curves cryptography has promising industrial attraction. National Security Agency (NSA) of USA purchased license of ECC from Certicom. It will use ECC in its cryptographic modernization initiative, which aims to replace about 1.3 million existing security equipments over the next 10 years. Public Key Infrastructure (PKI) is the most popular centralized and hierarchical infrastructure, consists of trusted third parties registration authority and certificate authority and provides solution for proving authenticity of public keys. Multi receiver signcryption ensure confidential and authenticated dissemination of information to multicast group member instead of multi recipient encryption and digital signature. It is attractive for stateful secure multicast to distribute and update session keys and stateless secure multicast to disseminate multicast messages. In this thesis, we proposed six multi-receiver signcryption schemes on elliptic curve in PKI setting. First, multi-receiver signcryption scheme has functionalities of confidential and authenticated multicast session key agreement and instant secure message communication. It is efficient in term of computation and communication cost and suitable for secure multicast communication. Second, multi receiver signcryption with forward secrecy has additional functionality of forward secrecy of messages. It ensures confidentiality even if an attacker has stolen the sender private key. Its low communication overhead could make this construction a better option for use in resource constrained secure multicast communication. xvii Third, multi receiver signcryption for firewalls has additional functionality of encrypted message authentication. It enables firewall to verify encrypted message without disclosing message contents and obtaining any secret parameter from the participants. In case of dispute judge can also verify the authenticity of ciphertext and solve the dispute with obtaining any secret parameter from the participants. Its security attributes and cost effectiveness makes it suitable choice for efficient and secure multicast firewalls applications. Fourth, generalized multi receiver signcryption scheme based on elliptic curves has functionality of digital signature or multi receiver encryption or multi receiver signcryption with single algorithm. Fifth, blind multi receiver signcryption scheme has additional functionality of sender anonymity. It has significance in applications as privacy preserving multicast communication; electronic voting and payment system to protect the sender privacy and guarantees the freedom of thoughts and freedom of opinion. Sixth, proxy multi receiver signcryption scheme has functionality of designated a proxy agent, who makes multicast communication on the behalf of original user. It has applications in privilege delegation mechanism, an essential service in modern enterprises and organizations to extend and operate business via designated agent due to temporal absence, lack of time or processing capability.