Sie sind auf Seite 1von 2

RESUMÉ

DEGREE : Bachelor of Engineering

BRANCH : Computer Science & Engineering

PERSONAL DETAILS

NAME : Mithun Kumar P

CONTACT ADDRESS: PERMANENT ADDRESS:


44/171 J-3, 44/171 J-3,
Rajapuram 1st street, Rajapuram 1st street,
Nedunchalai nagar, Nedunchalai nagar,
Salem-636005. Salem-636005.

DATE OF BIRTH : 17.07.1988 AGE : 21 SEX : Male

EMAIL ID : pmk_mithun@yahoo.com , pmk.mithun@gmail.com

FATHER'S NAME : Mr.K.Palaniswamy

MOTHER TONGUE : Tamil

LANGUAGES : Read : Tamil, English


Write : Tamil, English
Speak : Tamil, English

EDUCATIONAL DETAILS

Course Institution Board/ Year of Marks %


University Completion / CGPA

X Vidhya Vikas Higher State Board 2003 84.80


Secondary School,
Tiruchengode.
XII State Board 2005 78.41
Reliance Higher Secondary
School, Bhavani.
B.E Anna 2009 6.87
(CSE) PSG College of Technology, University
Coimbatore.
COMPUTER PROFICIENCY:

Languages : C, C++, core java.


Packages : MS-Office, Oracle 9i.
Platforms Used : Windows 98/XP/Vista.

PROJECT WORK UNDERTAKEN:

HÔTELIER- Hotel Resource Management System

The project deals with management of various resources of a hotel in a real time
environment. It provides options to manage finance, customer, management and commodity
related data in a systematic way which will help the overall improvement of the working of the
organization. It can easily be modified by removing or adding other features to suit any particular
organization.

Provably Secure Third Party Authenticated Quantum Key Distribution Protocol

In quantum cryptography, quantum key distribution protocols (QKDP) employs


quantum mechanism to distribute session keys and public discussions to check for eaves droppers
and verify the correctness of session keys. This work presents quantum key distribution protocols
(QKDPs) to safeguard security in large networks, ushering in new directions in classical
cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user
authentication and the other with explicit mutual authentication, are proposed to demonstrate the
merits of the new combination, which include the following:
1. Security against such attacks as man-in-the-middle, eavesdropping and replay.
2. Efficiency is improved as the proposed protocols contain the fewest number of
communication rounds among existing (QKDP).
3. Two parties can share and use a long-term secret (repeatedly).

HOBBIES:

• Fishing
• Hardware assembling
• Playing chess

I, MITHUNKUMAR P do hereby confirm that the information given above is true to the best of

my knowledge.