IIIT-Delhi Institutional Repository

Browsing Technical Reports by Title

Browsing Technical Reports by Title

Sort by: Order: Results:

  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Bera, Debajyoti; Goyal, Vikram; Saxena, Anuj S. (2012-03-26)
    There are many results on the possibilities of privacy leak in location-based services, and many remedies have also been suggested. In this paper, we look at this problem from an altogether different perspective - ...
  • Gosain, Devashish; Agarwal, Anshika; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Sharma, Piyush Kumar; Chaudhary, Shashwat; Hassija, Nikhil; Maity, Mukulika; Chakravarty, Sambuddho (IIIT-Delhi, 2019)
    Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Nagaraja, Shishir; Houmansadr, Amir; Kumar, Vijit; Agarwal, Pragya; Borisov, Nikita (2012-03-26)
    We propose Stegobot, a new generation botnet that communicates over probabilistically unobservable communication channels. It is designed to spread via social malware attacks and steal information from its victims. ...
  • Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar (2012-07-25)
    In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of commu- nication. Hence, this medium is often exploited by advertis- ing companies to reach masses. The unsolicited ...
  • Chakravarty, Sambuddho; Naik, Vinayak; Acharya, Hrishikesh Bhatt; Tanwar, Chaitanya Singh (2015-01-23)
    Network censorship and surveillance generally involves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users’ traffic, often using powerful networking devices, e.g. routers ...
  • Asthana, Siddhartha; Kumaraguru, Ponnurangam; Singh, Pushpendra; Singh, Amarjeet (2012-03-14)
    In developing regions, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate and are more reachable than any other medium. ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-14)
    Large amount of content is generated on online social net- working and micro-blogging services daily; Twitter is one such micro-blogging service. Twitter has evolved from be- ing used for conversing with friends and ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-26)
    Online social media has become an integral part of every Internet users' life. It has given common people a platform and forum to share information, post their opinions and promote campaigns. The threat of exploitation of ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Emerging interest of trading companies and hedge funds in mining social web has created new avenues for intelligent systems that make use of public opinion in driving investment decisions. It is well accepted that at ...
  • Goyal, Vikram; Dawar, Siddharth (2015-02-11)
    High-utility itemset mining is an emerging research area in the field of Data Mining. Several algorithms were proposed to find high- utility itemsets from transaction databases and use a data structure called UP-tree ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Behavioral finance is an upcoming research field which is drawing a lot of attention of both academia and industry. With changing dynamics of internet behavior of millions across the globe, it provides opportunity to ...

Search Repository


Advanced Search

Browse

My Account