Sumita a. Kudtarkar

4

Click here to load reader

Transcript of Sumita a. Kudtarkar

Page 1: Sumita a. Kudtarkar

Sumita A. KudtarkarEmail ID

[email protected]@yahoo.in

Residential Address:C/o Ashok B. Kudtarkar,

Sonarwada Baad, Karwar, Karnataka.Pin: 581301

Mob: 9730996835, 09916006227

OBJECTIVE

Seeking a position where I can implement my programming knowledge which will benefit an IT industry.

EDUCATIONAL QUALIFICATION

BE Aggregate Percentage: 63.41%

Course College UniversityYear ofpassing

Percentage marks

BE [Computer Science]

MMEC, Belgaum

VTU, Karnataka

2010 First Class

PUC(XII)

Govt. P.U College, Karwar

Karnataka State Board

June2006 Second Class

SSLC(X)

Sumati Dhamale Girls High

School, KarwarK.S.E.E.Board April2004 Second Class

SOFTWARE PROFICIENCY

Programming Languages : C, C++, Java, .NET and C#,Unix,Linux Operating System : Windows XP, Fedora, MS Office

Page 2: Sumita a. Kudtarkar

PROJECT WORK

FULLY DISTRIBUTED PROACTIVELY SECURED THRESHOLD MULTISIGNATURE SCHEME

Threshold-multisignature scheme combine the properties of threshold group-oriented

signature schemes and mutisignature schemes to yield a signature scheme that allows a

threshold (t) or more group members to collaboratively sign an arbitrary message. In the

threshold group signatures, the individual signers do not remain anonymous, but are

publicly identifiable from the information contained in the valid threshold-multisignature.

The main objective is to propose such a secure and efficient threshold multisignature

scheme. This uniquely defines the fundamental properties of threshold multisignature

schemes and shows that the proposed scheme satisfies these properties and eliminates the

latest attacks to which other similar schemes are subject. The efficiency of the proposed

scheme is analyzed and shown to be superior to its counterparts. The proposed discrete

logarithm based distributed key management infrastructure (DKMI), which consists of a

round optimal, publically verifiable, distributed key generation (DKG) protocol and a one

round, publically verifiable, distributed key redistribution, updating (DKRU) protocol.

DESIGN AND ANALYSIS:

SYSTEM DESIGN

The design of the system can be broadly divided into following three modules:

1. Sender module

2. ThirdParty module

3. Receiver module

ELECTIVE SUBJECTS Operation Research Java and J2EE C# Programming and .NET Information and Network security Ad-hoc Networks

Page 3: Sumita a. Kudtarkar

EXTRACURRICULAR ACTIVITY

Acquired training in C Programming [Satyam Institute, Karwar] Acquired training in C++ [Satyam Institute, Karwar] Acquired training in Java [Soft Musk, Belgaum] Presented technical paper on GSM [Global System for Mobile Communication] Sports : Badminton, Through ball, Kho-Kho.

ACHIEVEMENTS

Received several certificates in Mathematics Test during schooling [District Level 3rd Position].

Received several certificates in Badminton during schooling [1st Position]. Received certificates for Dancing and singing. Received 2nd Price in Science Exhibition during schooling [Solar Water Heater]

PERSONAL DETAILS

Date of Birth : 19th October, 1989Father’s Name : Ashok B. KudtarkarPresent Address : C/o Atul Bhondve D.Y.Patil College Rd . Rawet. Tal-Haweli , Dehu road PuneGender : FemaleNationality : IndianLanguages known : English, Marathi, Hindi, Kannada, Konkani.

DECLARATION

I hereby declare that the above information is true to the best of my Knowledge.

Sumita A. Kudtarkar