A comparative analysis of quantum crypto technique and datapath mining for identifying malicious manet nodes

Abstract

newline The implementation of the Quantum Computing Cryptography Protocol (QCCP) are still occurring the problem in the bit wise error. In proposed research work the Quantum Elliptical Curve Cryptography (QECC) protocol and Discover and Eradicate Fool around node in Emergency network using Combinatorial Techniques (DEFECT) have been implemented by achieving the secure gate way communication and finding of the malicious node in the network and also this research work focuses on analyzing the security in multiparty communication using QECC, ECC based QSS and DEFECT based DPCA with the performance parameters such as computation time and error rate.

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced