Search or add a thesis

Advanced Search (Beta)
Home > Formal specification of mobile communication system

Formal specification of mobile communication system

Thesis Info

Author

Saima Tariq

Department

Department of Computer Science

Program

MS

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2007

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Other

MS 004.68 SAF

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676723556121

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مو لانا ضیاء الدین احمد بدایونی

مولانا ضیاء الدین احمد بدایونی
افسوس ہے کہ گذشتہ جولائی میں ایک ممتاز علمی شخصیت مولانا ضیاء احمد بدایونی سابق صدر شعبہ فارسی مسلم یونیورسٹی نے وفات پائی ، مرحوم فارسی زبان کے فاضل اور مسلم الثبوت استاد تھے، انہوں نے فارسی کی درسیات پرانے طرز پر پڑھی تھیں اور عربی سے بھی واقف تھے، اس لیے فارسی زبان و ادب پر ان کی نظر ماہرانہ تھی، ان کا ذوق بڑا متنوع تھا، مذہبیات اور تاریخ اسلام سے بھی ان کو دلچسپی تھی، اور ان سب پر ان کے مضامین اور تصانیف موجود ہیں، ان میں سب سے اہم دیوان مومن کی شرح اور اس کا فاضلانہ مقدمہ ہے اور یہ کہنا صحیح ہوگا کہ جس طرح سب سے پہلے ڈاکٹر عبدالرحمن بجنوری نے کلامِ غالب کی اہمیت نمایاں کی تھی، اسی طرح مولانا ضیاء احمد نے مومنؔ کے کلام کی اہمیت واضح کی، وہ عملاًنہ صرف دیندار بلکہ خوش عقیدہ مسلمان تھے، جس کا اثر ان کی تمام مذہبی تحریروں میں ہے، اس زمانہ میں جب کہ فارسی کا ذوق گھٹتا جا رہا ہے مرحوم کی جگہ مشکل سے پُر ہوسکے گی، اﷲ تعالیٰ ان کی مغفرت فرمائے۔ (شاہ معین الدین ندوی، ستمبر ۱۹۷۳ء)

 

''فتح الرحمٰن فی اثبات مذہب النعمان''کا تحقیقی و تجزیاتی مطالعہ An Analytical study of the

In "Fath-ur-Rehman Fi Ithbāt-e-Madhab al-Naumān", Shaykh Abdul Haq Muhaddith Dehalvi collected Ahadith supporting the religion and sect of Imam Abu Hanifa (R.A) and described the differences of the jurists and gave preference to Hanafi School of thought. He has proved through this book that Imam’s sect is in accordance with the Sahih Ahadith and while removing the accusations leveled against Imam Abu Hanifa, he declared that these are the issues on which the contrariness of the hadith was accused but irony of the situation is that Abu Hanifa (R.A) is following the hadith while other jurists explicitly base their intellect and conjecture and the style of the book shows that Abu Hanifa (R.A) is the absolute doer of hadith and Imam Shafi (R.A) uses conjecture and opinion. Moreover, Author speaks on the authenticity of the hadiths which not only support him but also give comfort and consolation to the opposing party. This great book of Hazrat Shaykh Muhaddith (R.A) is unique and unique in its importance, infrequency, style of reasoning, research issues, preference of religion, and hadiths supporting Hazrat Imam Azam Abu Hanifa (R.A) which opens new chapters of coming research. In the said article, an analytical study of his book "Fath-ur-Rehman fi Asbat-e-Madhhab-e-Noman" will be presented which will expose the reality of Imam Abu Hanifa's accusation of being against the hadith and this great effort of Sheikh Abdul Haq will also be brought to light.

Secure Authenticated Key Agreement Schemes for Smart Grid Communications in Power Sector

The Internet of Things (IoT) has abundant non-trivial applications and Smart Grid is one of them. The IoT capacitate effortless and adept adoption of Smart Grid. Currently, it is anticipated as the mostprevalentmanifestationoftheIoT.SmartGridisemergingasthenextgenerationpowergrid due to its reliability, flexibility, and efficiency. It is a state-of-the-art distributed power generation and supply infrastructure with significant auxiliary traits of intelligence and two-way communication. The utility can monitor and control power consumption of the consumer for load balancing, in real time. Similarly, the consumer can keep a trail of his power usage to plan it as per his affordability or budget. The Smart Grid also furnishes an adequacy to integrate renewable energy sources. Despite the ample amelioration, Smart Grid faces some critical security challenges such as the denial-of-service, message injection, man-in-the-middle and replay attacks etc. Moreover, provision of an IP-based communication system in this very grid has made it more vulnerable to stern securityattacks. Iftheseattacksarenotproperlyaddressed,anadversarycanmaliciouslycompromise the user/device to degrade the performance of the Smart Grid. Itisstrenuoustoemployclassicaltechniquesinordertopreventabove-mentionedsecurityattacks due to soaring communication and computation overhead. Since the Smart Grid is delay sensitive and traffic intensive environment, it is therefore inevitable to concoct and realize security techniquesinsuchawaysothattheydonotpersuadedelayduetocomplexandcomputationintensive cryptographic operations. Theperplexingarchitectureandassortedsecuritydesideratumisthemajorhindrancetoofferaprevailing solution for Smart Grid security. This research work has undertaken to design and develop lightweight authentication protocols for insuring the Smart Grid. The optimal authentication protocolsforSmartGriddelaycriticalenvironmentnotonlywithstandpotentialsecurityattacksbutit also experiences scanty communication and computation overhead due to primitive cryptographic operations. In this research, we have embellished lightweight authentication protocols for endowing secure andreliableenvironmentattheexpenseofinsignificantcommunicationandcomputationoverhead. These protocols are capable of impeding well-nigh all sorts of trivial and non-trivial attacks. The first authentication protocol is based on a hybrid Diffie-Hellman algorithm. This lightweight protocol exploits typical cryptosystems of Advanced Encryption Standard (AES) and Rivest, Shamir and Adleman (RSA) to engender a session key. Additionally, Hash-based Message Authentication Code (HMAC) is also employed in it to perpetuate data integrity. Moreover, this authentication protocol promises to commence mutual authentication by averting major attacks such as man-inthe-middle and replay attack. The second authentication protocol is an Elliptic Curve Cryptography (ECC)-based solution for retaining Smart Grid security. Since ECC promises to offer analogous security clout with significantly reduced key size as compared to other cryptographic security solutions e.g. Diffie-Hellman (D-H), Digital Signature Algorithm (DSA) and RSA. This proposed protocol realizes mutual authentication with meager resource utilization. It is also verified that the proposed scheme can relentless the security attacks. Keeping in mind the complex and delay sensitive nature of the Smart Grid, a lightweight ECC-based authentication scheme is proposed. This ECC-based protocol not only provides mutual authentication with low computation and communication cost but also withstand absolute familiar security attacks. The third security solution is realized through bilinear pairing. This protocol enables the smart meters to get connected with utility control anonymously to avail the services provided by them. The smart meters realize this objective with the private key in the absence of trusted authority. The trusted authority is involved only during the registration phase. Thereafter, the fourth scheme presented in this research work is actually an enhanced identity-based key establishment protocol. This enhanced scheme is introduced after identifying the weaknesses in the protocol presented by Mohammadali et al. (published in IEEE Trans on Smart Grid, 2018). The formal and informal security analysis is carried out under predefined adversarial threat model to verify the robustness of the proposed authentication protocols against stern attacks. BurrowsAbadi-Needham logic (BAN logic) is utilized to evaluate the integrity of the exchanged information. In the end, the performance of the proposed authentication protocols is compared with recently presented related protocols in the literature. Performance comparisons reveal the computation and communication requirements of the proposed protocols as compared to homologous protocols.