IIIT-Delhi Institutional Repository

Browsing PhD Theses by Title

Browsing PhD Theses by Title

Sort by: Order: Results:

  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Agrawal, Megha; Chan, Donghoon (advisor); Sanadhy, Somitra (advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Jain, Paridhi; Kumaraguru, Ponnurangam (Advisor) (2016-04-28)
    Today, more than two hundred Online Social Networks (OSNs) exist where each OSN extends to offer distinct services to its users such as eased access to news or better business opportunities. To enjoy each distinct service, ...
  • Asthana, Siddhartha; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2017-01)
    Enabling support for information exchange has a great impact on the development of different sections of the society. Mobile phones using telecommunication services have enabled such support in several scenarios including ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2014-12-24)
    There has been a proliferation of Web 2.0 sites on the Internet. Contemporary Web 2.0 sites like Facebook and Twitter are primarily driven by user generated content (UGC). On the other hand, the volume of content by such ...
  • Jain, Milan; Singh, Amarjeet (Advisor); Chandan, Vikas (Advisor) (IIIT-Delhi, 2019-03)
    In buildings, air conditioning consumes a significant proportion of the aggregate electricity bill. Specifically, in residential and small-scale commercial buildings, people prefer to use room-level ACs (AC stands for Air ...
  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • N., Nalla Anandakumar; Sanadhya, Somitra Kumar (Advisor); Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2019-09)
    Internet of Things (IoT) is a vast and rapidly growing technology right now in the world of innovation. Billions of new electronic devices are going to be connected to the internet in wide-ranging applications. With this ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (Advisor) (2015-07-08)
    Online social media is a powerful platform for dissemination of information during important real- world events. Beyond the challenges of volume, variety and velocity of content generated on online social media, veracity ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Lone, Haroon Rashid; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-12)
    Buildings consume 50% of the total available electrical energy. Studies show that up to 20% of the energy gets waste due to several reasons such as appliance misconfigurations, faults, and abnormal user behavior. The ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...
  • Mondal, Sutapa; Mutharaju, Raghava (advisor); Bhatia, Sumit (advisor) (IIIT-Delhi, 2020-07)
    Knowledge graph (KG) embedding models have recently gained increased attention. However, most of the existing models for KG embeddings ignore the structure and characteristics of the underlying ontology. KGs are not ...
  • Bhatt, Himanshu S; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2014-04-14)
    A covariate in face recognition can be defined as an effect that independently increases the intra-class variability or decreases the inter-class variability or both. Covariates such as pose, illumination, expression, ...
  • Rastogi, Ayushi; Nagappan, Nachiappan (Advisor); Jalote, Pankaj (Advisor) (IIIT-Delhi, 2017-08)
  • Saxena, Anuj Shanker; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2019-04)
    The ubiquity of mobile devices has led to the deployment of many mobile applications for providing different types of services, like internet access, route recommendation, cab finder, nearby friends, etc. Some of these ...

Search Repository


Advanced Search

Browse

My Account