Computer Science and Engineering: Recent submissions

  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Jati, Arpan; Sanadhya, Somitra Kumar (Advisor) (2013-07-09)
    Many Peer to Peer (P2P) protocols and applications have become popular in the recent years and P2P accounts for a very large portion of the internet traffic. But, most protocols are designed with speed and efficiency in ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Agrawal, Swati; Sureka, Ashish (Advisor) (2013-04-08)
    YouTube is one of the largest video sharing website on the Internet. Several music and record companies, artists and bands have o cial channels on YouTube (part of the music ecosystem of YouTube) to promote and monetize ...
  • Chaudhary, Vidushi; Sureka, Ashish (Advisor) (2013-03-26)
    YouTube is one of the largest video sharing websites (with social networking features) on the Internet. The immense popularity of YouTube, anonymity and low publication barrier has resulted in several forms of misuse and ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2013-02-06)
    Twitter is a popular micro-blogging website which allows users to post 140-character limit mes- sages called tweets. Twitter users (also called Twitterers) post activity messages about their daily lives, opinions on ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet (2012-10-12)
    In developing countries, smartphones and high bandwidth connections are not yet within the reach of majority of the people. To share multimedia content among themselves, people rely on manual local sharing mechanisms i.e. ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar (2012-07-25)
    In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of commu- nication. Hence, this medium is often exploited by advertis- ing companies to reach masses. The unsolicited ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Behavioral finance is an upcoming research field which is drawing a lot of attention of both academia and industry. With changing dynamics of internet behavior of millions across the globe, it provides opportunity to ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Emerging interest of trading companies and hedge funds in mining social web has created new avenues for intelligent systems that make use of public opinion in driving investment decisions. It is well accepted that at ...
  • Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak (2012-03-26)
    Voice based telecommunication services are emerging as most appropriate medium for information dissemination in developing regions, as they overcome prevalent low literacy rate and are more reachable than any other ...
  • Sureka, Ashish (2012-03-26)
    Research shows that cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media and Web 2.0 platforms has become a common phenomenon. This is a growing concern and hence automated ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-26)
    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an automated algorithm that extracts discriminating information from local regions ...

Search Repository


Advanced Search

Browse

My Account