<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://repository.iiitd.edu.in/xmlui/handle/123456789/94">
<title>Year-2013</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/94</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://repository.iiitd.edu.in/xmlui/handle/123456789/111"/>
<rdf:li rdf:resource="http://repository.iiitd.edu.in/xmlui/handle/123456789/109"/>
<rdf:li rdf:resource="http://repository.iiitd.edu.in/xmlui/handle/123456789/99"/>
</rdf:Seq>
</items>
<dc:date>2026-04-11T01:30:24Z</dc:date>
</channel>
<item rdf:about="http://repository.iiitd.edu.in/xmlui/handle/123456789/111">
<title>Android phone based appraisal of app behavior on cell networks</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/111</link>
<description>Android phone based appraisal of app behavior on cell networks
Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit Krishnan
The rapid adoption of smartphones has engendered a large&#13;
ecosystem of mobile data applications. In fact, a large part&#13;
of mobile tra c is now data and not voice. Many of these&#13;
applications, for example VoIP clients, stay active in the&#13;
background. In the background, they may not communi-&#13;
cate large amounts of data. However, their regular bursts&#13;
of activity can lead to large signaling overheads, wastage of&#13;
radio resources, and draining of a phone's battery. Signal-&#13;
ing overheads can lead to service outage over a large geo-&#13;
graphical region by overloading the radio network controller&#13;
(gateway) of the 3G (LTE) network, which is expected to&#13;
handle signaling from a large number of base stations.&#13;
In this work we propose for Android smartphones an on-the-&#13;
phone mechanism to detect background applications that&#13;
due to bad design (given the network's settings) or their&#13;
malicious nature (exploiting the network's settings) lead to&#13;
above mentioned ine ciencies. Speci cally, we propose the&#13;
metrics of average energy/byte and the average time-to-state-&#13;
promotion (TSP) after the Radio Resource Control (RRC)&#13;
enters the IDLE state. The metrics capture an application's&#13;
e ciency, which is a function of the network's settings of&#13;
RRC inactivity timeout values and an application's back-&#13;
ground activity. The e cacy of these metrics is tested on&#13;
commonly used Android applications. We also outline a&#13;
fully functional ready-to-install tool that we developed and&#13;
used for our studies.
</description>
<dc:date>2013-10-31T05:07:52Z</dc:date>
</item>
<item rdf:about="http://repository.iiitd.edu.in/xmlui/handle/123456789/109">
<title>Characterizing mobility patterns of people in developing countries using their mobile phone data</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/109</link>
<description>Characterizing mobility patterns of people in developing countries using their mobile phone data
Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak
Location data collected from mobile phone users&#13;
provide an ideal platform to generate human mobility patterns.&#13;
These patterns give us insights into how people travel in their dayto-&#13;
day lives.With availability of cellular data, either at large-scale&#13;
but with low location accuracy or at small-scale but with high&#13;
location accuracy, studying mobility patterns is now possible. An&#13;
example of former dataset is CDRs (Call Detail Records) and&#13;
that of latter is GSM/WiFi/GPS traces collected from mobile&#13;
phones. So far the studies have been focused on data collected&#13;
in developed countries.&#13;
In this paper, we make a first attempt in finding and analyzing&#13;
mobility patterns of people in developing countries using both the&#13;
categories of data. We use publicly available CDR data and we&#13;
collect our own data for capturing fine-grained location. Ours is&#13;
the first dataset of its kind that is publicly available. We analyze&#13;
this data to find movement as well as place visiting patterns,&#13;
compare our findings with existing studies, and discuss their&#13;
implications. For example, urban people in developing countries&#13;
travel farther distances in their day to day life as compared&#13;
to people living in non-urban areas. Also, distance travelled by&#13;
urban people in developing countries is as much as six times&#13;
lower compared to developed countries.
</description>
<dc:date>2013-10-10T08:52:47Z</dc:date>
</item>
<item rdf:about="http://repository.iiitd.edu.in/xmlui/handle/123456789/99">
<title>Biclique cryptanalysis of full round AES with reduced data complexity</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/99</link>
<description>Biclique cryptanalysis of full round AES with reduced data complexity
Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar
Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool&#13;
for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has&#13;
a very high query complexity (of the order of 288 for AES-128, 280 for AES-192 and 240 for AES-256).&#13;
This naturally puts a big question mark over the practical feasibility of implementing biclique attack in&#13;
real world. In this work, we re-evaluate the security of full round AES against biclique cryptanalysis. We&#13;
describe an alternate biclique construction with signi cantly reduced query complexity (of the order of 224&#13;
for AES-128, 232 for AES-192 and 28 for AES-256) at the expense of a slightly increased computational&#13;
cost. In our approach, we use independent biclique technique to launch a chosen ciphertext attack against&#13;
AES.
</description>
<dc:date>2013-05-31T05:49:40Z</dc:date>
</item>
</rdf:RDF>
