IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Basak, Protichi; De, Saurabh; Vatsa, Mayank (Advisor) (2017-04-18)
    The idea of fusing multiple biometric modalities for the identification of an individual has received significant attention in the last two decades. However, this has been limited to recognizing adults only. With the quality ...
  • Bansal, Shruti; Singh, Pushpendra (Advisor) (2015-12-03)
    Blended Learning is an amalgamation of face-to-face and e-learning. MOOCs (Massive Open Online Courses), a popular e-learning source of rich quality content produced by best instructors are freely available to learners ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Agarwal, Ayush; Sinha, Akshat; Arora, Chetan (Advisor); Gupta, Anubha (IIIT-Delhi, 2017-04-18)
    The automated segmentation of Brain MRI is an important initial step in the application of anomaly detection and pain localization due to neurological diseases. In this view, we aim to segment the sub structures (Caudate, ...
  • Asthana, Siddhartha; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2017-01)
    Enabling support for information exchange has a great impact on the development of different sections of the society. Mobile phones using telecommunication services have enabled such support in several scenarios including ...
  • Prakash, Divay; Kumar, Hemant (Advisor) (IIIT-Delhi, 2017-04-18)
    The building management HVAC(heating, ventilation and air conditioning) system for Phase II of IIIT-Delhi campus is designed to take care (and advantage) of diversity of use. Instead of using large AHUs(Air Handling ...
  • Agarwal, Anshika; Gosain, Devashish; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Agarwal, Anshika; Chakravarty, Sambuddho (Advisor) (2016-09-15)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more towards free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Jain, Prachi; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of ...
  • Verma, Ishita; Saran, Nitika; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Pose estimation is a fundamental problem in computer vision and is prevalent in numerous applications such as object-detection, tracking etc. Generally, in pose estimation between two camera views, we have 6 degrees of ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...

Search Repository


Advanced Search

Browse

My Account