IIIT-Delhi Institutional Repository

Browsing PhD Theses by Title

Browsing PhD Theses by Title

Sort by: Order: Results:

  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Jain, Paridhi; Kumaraguru, Ponnurangam (Advisor) (2016-04-28)
    Today, more than two hundred Online Social Networks (OSNs) exist where each OSN extends to offer distinct services to its users such as eased access to news or better business opportunities. To enjoy each distinct service, ...
  • Asthana, Siddhartha; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2017-01)
    Enabling support for information exchange has a great impact on the development of different sections of the society. Mobile phones using telecommunication services have enabled such support in several scenarios including ...
  • Kumar, Piyush; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT- Delhi, 2021-08)
    Free and open communication over the Internet is essential for the overall advancement of modern societies. However, there are numerous ways with which malevolent adversaries try to control the flow of information, by ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2014-12-24)
    There has been a proliferation of Web 2.0 sites on the Internet. Contemporary Web 2.0 sites like Facebook and Twitter are primarily driven by user generated content (UGC). On the other hand, the volume of content by such ...
  • V, Sathish; Butail, Sachit (Advisor); Orkisz, Michal (Advisor) (IIIT-Delhi, 2021-02)
    Industrial robots are complex systems that require technical expertise for condition monitoring and diagnostics. In small and medium scale industries, adequate skilled resources may not be available to monitor the robots ...
  • Jain, Milan; Singh, Amarjeet (Advisor); Chandan, Vikas (Advisor) (IIIT-Delhi, 2019-03)
    In buildings, air conditioning consumes a significant proportion of the aggregate electricity bill. Specifically, in residential and small-scale commercial buildings, people prefer to use room-level ACs (AC stands for Air ...
  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • N., Nalla Anandakumar; Sanadhya, Somitra Kumar (Advisor); Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2019-09)
    Internet of Things (IoT) is a vast and rapidly growing technology right now in the world of innovation. Billions of new electronic devices are going to be connected to the internet in wide-ranging applications. With this ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (Advisor) (2015-07-08)
    Online social media is a powerful platform for dissemination of information during important real- world events. Beyond the challenges of volume, variety and velocity of content generated on online social media, veracity ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Dutta, Hridoy Sankar; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi., 2021-09)
    Online media platforms have enabled users to connect with individuals, organizations and share their thoughts. Other than connectivity, these platforms also serve multiple purposes - education, promotion, updates, awareness, ...
  • Lone, Haroon Rashid; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-12)
    Buildings consume 50% of the total available electrical energy. Studies show that up to 20% of the energy gets waste due to several reasons such as appliance misconfigurations, faults, and abnormal user behavior. The ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...

Search Repository


Advanced Search

Browse

My Account