Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/570252
Title: Evaluation Of The Teratogenic Profile Of Combination Of Lumacaftor And Ivacaftor In Sprague Dawley Rats And New Zealand White Rabbits Efficient And Secure Certificateless Signature And Signcryption Schemes Using Elliptic Curve Cryptography
Researcher: Srinivasa Rao Gopisetti
Guide(s): P. Vasudeva Reddy
Keywords: Engineering
Engineering and Technology
Engineering Multidisciplinary
University: Andhra University
Completed Date: 2023
Abstract: Digital signature schemes are one of the most important consequences of newlinethe Public Key Cryptography (PKC). These schemes provide authentication, newlineintegrity and non-repudiation to digital communications. Similarly, Signcryption is newlinea cryptographic primitive which simultaneously provide both functionality of newlinedigital signature and public key encryption in a single logical step. During the last newlineyears many authentication schemes such as signature schemes, signcryption newlineschemes and their extensions have been proposed in the traditional PKC, Identitybased newlinePKC (ID-PKC) and Certificateless-based PKC (CL-PKC) settings. newlineIn many applications, a large number of signatures have to be transmitted newlineover networks, which require large bandwidth, storage space and computational newlinecost. In such situations, to improve the efficiency of the system, aggregate newlinesignature schemes are more suitable. Aggregate signature compresses multiple newlinesignatures on multiple messages in to a single signature. Thus aggregate signatures newlineplay a vital role in many practical applications where computational power, newlinebandwidth and storage resources are limited. newlineNowadays, the Internet of Things (IoT) is an emerging paradigm which newlineaims to interconnect all smart physical devices to provide smart services to the newlineusers. These interconnected smart devices interact and communicate to transfer newlinedata to the central servers through the Internet and make use of the various newlinetechnologies associated with the Internet. Some of the IoT applications include newlinesmart cities, smart homes, smart agriculture, smart grids, health care, and newlineIndustries etc. While deploying IoT in real world, ensuring the security of IoT newlinenetworks becomes increasingly crucial. Moreover, many of them are limited in newlineresources such as energy, memory, processing power and even physical space, newlinewhile implementing traditional security options is a challenging factor. Security newlineand efficiency are two important factors to be considered in the design of new newlinecryptographic schemes for practical applications. newlineAndhra University
Pagination: 262 Pg
URI: http://hdl.handle.net/10603/570252
Appears in Departments:Department of Engineering Mathematics

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File226.86 kBAdobe PDFView/Open
02_prelim pages.pdf1.67 MBAdobe PDFView/Open
03_contents.pdf230.77 kBAdobe PDFView/Open
04_abstract.pdf143.69 kBAdobe PDFView/Open
05_chapter 1.pdf782.76 kBAdobe PDFView/Open
06_chapter 2.pdf808.92 kBAdobe PDFView/Open
07_chapter 3.pdf1.18 MBAdobe PDFView/Open
08_chapter 4.pdf910.07 kBAdobe PDFView/Open
09_chapter 5.pdf998.93 kBAdobe PDFView/Open
10_chapter 6.pdf245.15 kBAdobe PDFView/Open
11_annexure.pdf4.17 MBAdobe PDFView/Open
80_recommendation.pdf416.02 kBAdobe PDFView/Open
9861 - srinivasa rao gopisetti @ award.pdf3.07 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: