IIIT-Delhi Institutional Repository

Browsing Technical Reports by Title

Browsing Technical Reports by Title

Sort by: Order: Results:

  • Sureka, Ashish (2012-03-26)
    Research shows that cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media and Web 2.0 platforms has become a common phenomenon. This is a growing concern and hence automated ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2014-09-15)
    Simultaneous execution of multiple threads on multicores is necessary for good resource utilization. However, such utilization calls for accurate models to predict the impact on performance due to contention of shared ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Kumar, Ashish; Sanadhya, Somitra Kumar (2012-03-14)
    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash ...
  • Asthana, Siddhartha; Singh, Pushpendra (2014-04-28)
    Dialing a telephone number of an organization and coming across an automated system attending the call, instead of a human, has become common. These automated applications are known as Interactive Voice Response (IVR) ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Agarwal, Anshika; Gosain, Devashish; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak (2012-03-26)
    Voice based telecommunication services are emerging as most appropriate medium for information dissemination in developing regions, as they overcome prevalent low literacy rate and are more reachable than any other ...
  • Bhatt, Himanshu S; Singh, Richa; Vatsa, Mayank (2015-01-27)
    Face recognition has found several applications ranging from cross border security, surveillance, access control, multimedia to forensics. Face recognition under variations due to pose, illumination, and expression has ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...

Search Repository


Advanced Search

Browse

My Account