Sumita a. Kudtarkar
Click here to load reader
-
Upload
ahmad-khan -
Category
Documents
-
view
32 -
download
2
Transcript of Sumita a. Kudtarkar
Sumita A. KudtarkarEmail ID
[email protected]@yahoo.in
Residential Address:C/o Ashok B. Kudtarkar,
Sonarwada Baad, Karwar, Karnataka.Pin: 581301
Mob: 9730996835, 09916006227
OBJECTIVE
Seeking a position where I can implement my programming knowledge which will benefit an IT industry.
EDUCATIONAL QUALIFICATION
BE Aggregate Percentage: 63.41%
Course College UniversityYear ofpassing
Percentage marks
BE [Computer Science]
MMEC, Belgaum
VTU, Karnataka
2010 First Class
PUC(XII)
Govt. P.U College, Karwar
Karnataka State Board
June2006 Second Class
SSLC(X)
Sumati Dhamale Girls High
School, KarwarK.S.E.E.Board April2004 Second Class
SOFTWARE PROFICIENCY
Programming Languages : C, C++, Java, .NET and C#,Unix,Linux Operating System : Windows XP, Fedora, MS Office
PROJECT WORK
FULLY DISTRIBUTED PROACTIVELY SECURED THRESHOLD MULTISIGNATURE SCHEME
Threshold-multisignature scheme combine the properties of threshold group-oriented
signature schemes and mutisignature schemes to yield a signature scheme that allows a
threshold (t) or more group members to collaboratively sign an arbitrary message. In the
threshold group signatures, the individual signers do not remain anonymous, but are
publicly identifiable from the information contained in the valid threshold-multisignature.
The main objective is to propose such a secure and efficient threshold multisignature
scheme. This uniquely defines the fundamental properties of threshold multisignature
schemes and shows that the proposed scheme satisfies these properties and eliminates the
latest attacks to which other similar schemes are subject. The efficiency of the proposed
scheme is analyzed and shown to be superior to its counterparts. The proposed discrete
logarithm based distributed key management infrastructure (DKMI), which consists of a
round optimal, publically verifiable, distributed key generation (DKG) protocol and a one
round, publically verifiable, distributed key redistribution, updating (DKRU) protocol.
DESIGN AND ANALYSIS:
SYSTEM DESIGN
The design of the system can be broadly divided into following three modules:
1. Sender module
2. ThirdParty module
3. Receiver module
ELECTIVE SUBJECTS Operation Research Java and J2EE C# Programming and .NET Information and Network security Ad-hoc Networks
EXTRACURRICULAR ACTIVITY
Acquired training in C Programming [Satyam Institute, Karwar] Acquired training in C++ [Satyam Institute, Karwar] Acquired training in Java [Soft Musk, Belgaum] Presented technical paper on GSM [Global System for Mobile Communication] Sports : Badminton, Through ball, Kho-Kho.
ACHIEVEMENTS
Received several certificates in Mathematics Test during schooling [District Level 3rd Position].
Received several certificates in Badminton during schooling [1st Position]. Received certificates for Dancing and singing. Received 2nd Price in Science Exhibition during schooling [Solar Water Heater]
PERSONAL DETAILS
Date of Birth : 19th October, 1989Father’s Name : Ashok B. KudtarkarPresent Address : C/o Atul Bhondve D.Y.Patil College Rd . Rawet. Tal-Haweli , Dehu road PuneGender : FemaleNationality : IndianLanguages known : English, Marathi, Hindi, Kannada, Konkani.
DECLARATION
I hereby declare that the above information is true to the best of my Knowledge.
Sumita A. Kudtarkar