Browsing Year-2013 by Title

Sort by: Order: Results:

  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Mittal, Megha; Sureka, Ashish (Advisor) (2014-01-24)
    An undergraduate level Software Engineering course generally consists of a team-based semester long project and emphasizes on both technical and managerial skills. Software Engineering is a practice-oriented and applied ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...

Search Repository


Advanced Search

Browse

My Account