<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Year-2015</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/219</link>
<description/>
<pubDate>Fri, 10 Apr 2026 20:26:45 GMT</pubDate>
<dc:date>2026-04-10T20:26:45Z</dc:date>
<item>
<title>A fail-fast mechanism for authenticated encryption schemes</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/385</link>
<description>A fail-fast mechanism for authenticated encryption schemes
Gupta, Naina; Chang, Donghoon (Advisor)
In the modern world, almost every computing device uses some cryptographic&#13;
technique or the other. Over the years several schemes have been&#13;
proposed implemented and standardized. For any kind of data transfer the&#13;
primary goals are encryption and authentication. Historically, these two&#13;
goals are achieved separately, via two different techniques. Any symmetric&#13;
cipher scheme can be used for encryption, whereas, for authentication,&#13;
usage of a keyed MAC is prevalent. There is another approach known as&#13;
Authenticated Encryption (AE), which fulfills both the goals at the same&#13;
time.&#13;
From an implementation perspective, it is important that, if the packet&#13;
is malformed, it is rejected as soon as possible. Common techniques like&#13;
AES-CBC, allow for such a fail-fast paradigm using padding oracle. But,&#13;
the same technique cannot be applied for other common AE techniques like&#13;
AES-GCM. In this work, we provide a technique using which any AE scheme&#13;
can be used directly (without any change), whilst providing the good fail-fast&#13;
features at the same time.
</description>
<pubDate>Fri, 01 Jan 2016 12:23:32 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/385</guid>
<dc:date>2016-01-01T12:23:32Z</dc:date>
</item>
<item>
<title>Top-K high utility episode mining in complex event sequence</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/361</link>
<description>Top-K high utility episode mining in complex event sequence
Rathore, Sonam; Goyal, Vikram (Advisor)
Mining high utility episodes in complex event sequences is an emerging&#13;
topic in data mining. In utility mining, users set a minimum threshold and&#13;
the episodes having higher utility than the threshold are reported. The&#13;
utility framework introduced in episode mining provides more informative&#13;
and usable knowledge as compared to frequent episode mining. However,&#13;
it is difficult for the user to set an appropriate minimum utility thresh-&#13;
old. As the user cannot predict the count of mined episodes by the utility&#13;
threshold, the number of reported episodes can vary hugely in accordance&#13;
to the set threshold. To address this issue, in this thesis we propose an&#13;
algorithm for mining Top-K high utility episode in complex event sequence.&#13;
It discovers episodes with highest utility to ones with kth highest utility&#13;
where the user can set the desired count of episodes, k. We also propose&#13;
two different strategies to reduce the search space by raising the minimum&#13;
threshold e ectively. We conduct experiments on real dataset and show the&#13;
effectiveness of our approach.
</description>
<pubDate>Sat, 05 Dec 2015 06:10:35 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/361</guid>
<dc:date>2015-12-05T06:10:35Z</dc:date>
</item>
<item>
<title>Face detection and verication in unconstrained videos: challenges, detection, and benchmark evaluation</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/360</link>
<description>Face detection and verication in unconstrained videos: challenges, detection, and benchmark evaluation
Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor)
With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily focused on controlled environments with a single person in a&#13;
frame. However, in real world surveillance situations, the environment is unconstrained and the&#13;
videos are likely to record multiple people within the  eld of view. Surveillance videos encompass&#13;
multiple challenges for face detection and face recognition. For instance, detection algorithms&#13;
may be a ected due to size of a face image, occlusion, pose, illumination, and background while&#13;
recognition algorithms may be a ected due to low resolution, occlusion, pose, illumination, and&#13;
blurriness. State-of-the-art approaches for both face detection and face recognition in such challenging scenarios are currently in nascent stages. Moreover, due to the unavailability of such&#13;
databases, it is difficult for researchers to pursue this important challenge. This thesis attempts&#13;
to  ll the gap in unconstrained face recognition in two ways:develop a large unconstrained&#13;
video face database, and create a benchmark protocol and perform baseline experiments&#13;
for both face detection and recognition. As the  rst contribution of this thesis, a large video&#13;
database of 384 videos consisting of 258 subjects is prepared. Each video generally contains multiple subjects in unconstrained settings. Further, ground truth for face and landmark (eye and&#13;
mouth) detection is manually annotated. As the second contribution of this thesis, we design&#13;
a benchmark protocol for face detection and recognition evaluation. Using the protocols, we&#13;
evaluate existing face detection and face recognition approaches, including commercial systems.&#13;
Poor face detection and veri cation results showcase the challenging nature of the problem and&#13;
the database.
</description>
<pubDate>Sat, 05 Dec 2015 06:04:24 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/360</guid>
<dc:date>2015-12-05T06:04:24Z</dc:date>
</item>
<item>
<title>TASVEER : tomography of India's internet infrastructure</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/359</link>
<description>TASVEER : tomography of India's internet infrastructure
Singh, Rahul Kumar; Chakravarty, Sambuddho (Advisor)
With approximately 250 million Internet users, India stands amongst the top 5 Internet using&#13;
nations of the world. India's network space is made up of 789 Autonomous Systems (ASes),&#13;
that route all the network traffic of India. On the other hand, US has approximately 300&#13;
million users, whose traffic is routed over 22K ASes. Thus, a relatively small network routes&#13;
the traffic of large number of Indian users. Failures and attacks in such networks could impact&#13;
large number of users. However, being a relatively small number, it becomes easy to generate&#13;
maps presenting the connectivity of ASes in the networks and the routers that make up the&#13;
ASes. Such information could be used for various purposes such as diagnosing network failures&#13;
and attacks, large scale network surveillance and bypassing such surveillance, load balancing,&#13;
efficient content distribution and delivery.&#13;
We present, a first effort to our knowledge, the topological information of India's entire Internet&#13;
space representing the connectivity between all 789 ASes and intra-domain routers. Our research&#13;
presents information of routers and ASes that transport relatively large fraction of tra c for vital&#13;
network installations like popular ISP users, important organizations like  nancial institutions,&#13;
educational institutions, research organizations etc.
</description>
<pubDate>Thu, 03 Dec 2015 13:08:14 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/359</guid>
<dc:date>2015-12-03T13:08:14Z</dc:date>
</item>
</channel>
</rss>
