MTech Theses: Recent submissions

  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Jati, Arpan; Sanadhya, Somitra Kumar (Advisor) (2013-07-09)
    Many Peer to Peer (P2P) protocols and applications have become popular in the recent years and P2P accounts for a very large portion of the internet traffic. But, most protocols are designed with speed and efficiency in ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Agrawal, Swati; Sureka, Ashish (Advisor) (2013-04-08)
    YouTube is one of the largest video sharing website on the Internet. Several music and record companies, artists and bands have o cial channels on YouTube (part of the music ecosystem of YouTube) to promote and monetize ...
  • Chaudhary, Vidushi; Sureka, Ashish (Advisor) (2013-03-26)
    YouTube is one of the largest video sharing websites (with social networking features) on the Internet. The immense popularity of YouTube, anonymity and low publication barrier has resulted in several forms of misuse and ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2013-02-06)
    Twitter is a popular micro-blogging website which allows users to post 140-character limit mes- sages called tweets. Twitter users (also called Twitterers) post activity messages about their daily lives, opinions on ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Sangeeta (2012-03-14)
    Bug or Fault localization is a process of identifying the speci c location(s) or region(s) of source code (at various granularity levels such as the directory path, le, method or state- ment) that is faulty and needs ...

Search Repository


Advanced Search

Browse

My Account