Muhammad Nasir Mumtaz Bhutta

Learn More
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/ Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the(More)
This study was conducted on the Lagar Distributary of Gugera Branch of Lower Chenab Canal, Punjab, Pakistan. A computer model “MISTRAL” was adopted for evaluating management options. The study showed that the model can be used as a decision support tool for prioritizing management options. The model suggests that under current physical conditions of this(More)
Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mechanism for trust and key management. However, standard PKI validation and revocation mechanisms are considered major reasons for its unsuitability for delay/disruption tolerant networking (DTN). DTN requires mechanism to authenticate messages at each node(More)
Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and working of PEPs. This paper presents the concept and detailed design of ML-IPSec by breaking the IP datagram into three zones while(More)
  • 1