IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Kumar, Ashish; Sanadhya, Somitra Kumar (2012-03-14)
    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash ...
  • Rathee, Gaurav; Pandey, Jalaj; Akhtar, Mohammad Hammad; Sharma, Ojaswa (Advisor) (2017-04-18)
    Usually in new places sign boards are used to provide directions or infrastructural information, this approach is quite rudimentary and limited. These boards can provide us with fixed and limited information and require ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Jain, Paridhi; Kumaraguru, Ponnurangam (Advisor) (2016-04-28)
    Today, more than two hundred Online Social Networks (OSNs) exist where each OSN extends to offer distinct services to its users such as eased access to news or better business opportunities. To enjoy each distinct service, ...
  • Asthana, Siddhartha; Singh, Pushpendra (2014-04-28)
    Dialing a telephone number of an organization and coming across an automated system attending the call, instead of a human, has become common. These automated applications are known as Interactive Voice Response (IVR) ...
  • Mishra, Akanksha; Sureka, Ashish (Advisor) (2015-08-24)
    Business Process and Model Notation (BPMN) is a graphical model of business processes and Semantic of Business Vocabulary and Business Rules (SBVR) provide business rules corresponding to that business process. Though both ...
  • Meet, Maheshwari; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2021-12)
    Online education platforms have diverse learning content like videos, audio lectures, and technical articles. The major drawback of video-based learning content is the inability to directly access the content of interest ...
  • Goyal, Tanishk; Agrawal, Shivam; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-12)
    In this BTP Project we undertake an entrepreneurial venture in the web3 space called Atom DAO. Atom DAO is a community of developers who are willing to grow their development skills by working on industry-level tasks. ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Basak, Protichi; De, Saurabh; Vatsa, Mayank (Advisor) (2017-04-18)
    The idea of fusing multiple biometric modalities for the identification of an individual has received significant attention in the last two decades. However, this has been limited to recognizing adults only. With the quality ...
  • Bansal, Shruti; Singh, Pushpendra (Advisor) (2015-12-03)
    Blended Learning is an amalgamation of face-to-face and e-learning. MOOCs (Massive Open Online Courses), a popular e-learning source of rich quality content produced by best instructors are freely available to learners ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Caur, Samiya; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    Ever since the 2014 Lok Sabha election, social media platforms such as Twitter, Facebook etc.have become a vital part of election campaigns in India with political parties investing heavily in the expansion of their ...
  • Agarwal, Ayush; Sinha, Akshat; Arora, Chetan (Advisor); Gupta, Anubha (IIIT-Delhi, 2017-04-18)
    The automated segmentation of Brain MRI is an important initial step in the application of anomaly detection and pain localization due to neurological diseases. In this view, we aim to segment the sub structures (Caudate, ...
  • Asthana, Siddhartha; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2017-01)
    Enabling support for information exchange has a great impact on the development of different sections of the society. Mobile phones using telecommunication services have enabled such support in several scenarios including ...
  • Prakash, Divay; Kumar, Hemant (Advisor) (IIIT-Delhi, 2017-04-18)
    The building management HVAC(heating, ventilation and air conditioning) system for Phase II of IIIT-Delhi campus is designed to take care (and advantage) of diversity of use. Instead of using large AHUs(Air Handling ...
  • Kumar, Piyush; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT- Delhi, 2021-08)
    Free and open communication over the Internet is essential for the overall advancement of modern societies. However, there are numerous ways with which malevolent adversaries try to control the flow of information, by ...

Search Repository


Advanced Search

Browse

My Account