IIIT-Delhi Institutional Repository

Browsing Year-2012 by Issue Date

Browsing Year-2012 by Issue Date

Sort by: Order: Results:

  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2013-02-06)
    Twitter is a popular micro-blogging website which allows users to post 140-character limit mes- sages called tweets. Twitter users (also called Twitterers) post activity messages about their daily lives, opinions on ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...

Search Repository


Advanced Search

Browse

My Account