IIIT-Delhi Institutional Repository

Browsing Technical Reports by Title

Browsing Technical Reports by Title

Sort by: Order: Results:

  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Agarwal, Anshika; Gosain, Devashish; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak (2012-03-26)
    Voice based telecommunication services are emerging as most appropriate medium for information dissemination in developing regions, as they overcome prevalent low literacy rate and are more reachable than any other ...
  • Bhatt, Himanshu S; Singh, Richa; Vatsa, Mayank (2015-01-27)
    Face recognition has found several applications ranging from cross border security, surveillance, access control, multimedia to forensics. Face recognition under variations due to pose, illumination, and expression has ...
  • Mongia, Aanchal; Gunturi, Venkata M. Viswanath; Naik, Vinayak (IIIT-Delhi, 2017-11-29)
    Our paper aims to build a classification-model which delineates the typical motion-related activities performed at a metro station using smart phone sensors. We focus on typical movements, such as climbing the stairs or ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Bhardwaj, Abhishek; Arjunan, Pandarasamy; Singh, Amarjeet; Naik, Vinayak; Singh, Pushpendra (2012-03-26)
    Ubiquitous availability of cellular network and cheap mobile phones have made them promising sensing platforms for various application domains including healthcare, environment, and astronomy among others. However, ...

Search Repository


Advanced Search

Browse

My Account