Items where Subject is "Engineering and Technology > Computer and Information Science > Information Security"
Group by: Creators | Item Type
Number of items at this level: 81.
Baral, Sanjib Kumar and Dash, Sourav (2013) Development of Time-Stamped Signcryption Scheme and its Application in E-Cash System. BTech thesis.
Devi, Kshetrimayum Jenita (2013) A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique. BTech thesis.
Gupta, Vikash Kumar (2013) Novel Schemes for Authentication. BTech thesis.
Iyer, Vinay (2013) Group signature Scheme resistant against Colluding Attack. MTech thesis.
Jena, Ankita (2013) Improved authentication mechanism based on elliptic curve cryptography. BTech thesis.
Majeti, Sriram (2014) A Multisignature Scheme with Distinguished Signing Authorities. BTech thesis.
Mohanty, Manoj Kumar (2013) Secure Data Storage on the Cloud using Homomorphic Encryption. MTech thesis.
Mudgil, Pushpendra and Murmu, Chandni (2013) A Strong Proxy Signature Scheme based on Partial Delegation. BTech thesis.
., Lalzirtira (2013) Graphical User Authentication. MTech thesis.
., Prateek (2013) Intrusion Detection Using Self-Training Support Vector Machines. BTech thesis.
Agarwal, Keshav (2012) Secure Messaging Service on Google App Engine using ECC and RSA Encryption. BTech thesis.
Aich, Dibyendu (2009) Secure Query Processing by Blocking SQL Injection. MTech thesis.
Akram, S T (2014) Security in smartphones and tablets. BTech thesis.
Ankush, S D (2014) XSS attack prevention using DOM based filtering API. MTech thesis.
B, Karthikeyan (2014) Detecting and Isolating Distributed Denial of Service attack in Smart Grid Systems. MTech thesis.
Bakshi, Sambit (2011) Development of Robust Iris Localization and Impairment Pruning Schemes. MTech thesis.
Bakshi, Sambit (2014) Periocular Localization and Feature Extraction for Human Recognition. PhD thesis.
Bapna, Deependra (2014) Intrusion detection system for wireless sensor network. MTech thesis.
Biswal, Baikuntha Narayan (2010) Test Case Generation and Optimization of Object-Oriented Software using UML Behavioral Models. MTech by Research thesis.
Biswal, Biswa Bhusan and Mangal, Sukanta Kumar (2012) A Novel Blind Signature Scheme Based On Discrete Logarithm Problem With Un-traceability. BTech thesis.
Biswal, S K (2014) On Board unit based authentication for V2V communication in VANET. MTech thesis.
Chauhan, S K (2010) A Study of Inference Control Techniques. BTech thesis.
Chhotaray, Animesh Chhotaray and Samal, Abhijit Samal (2011) A Novel Blind Signature Based Upon ECDLP. BTech thesis.
Chhotaray, Sukant Kumar (2015) Asymmetric Image Encryption based on Cipher Matrices. PhD thesis.
Das, Rohit Kumar (2014) Development of an ECDLP based Traceable Blind Signature Scheme and its Application to E-Auction. MTech thesis.
Das, S S (2014) Code Obfuscation using Code Splitting with Self-modifying Code. MTech thesis.
Faruk, Imran Hossain (2013) A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network. MTech thesis.
Gupta, M K (2010) Hardware Implementation of Densely Packed Decimal Encoding. BTech thesis.
Jain, A K (2014) Application of intrusion detection system in automatic evidence collection using digital forensics. MTech thesis.
Jena, Biswajit and Mishra, Gouri Sankar (2011) A novel group signature scheme without one way hash. BTech thesis.
Jena, Debasish (2010) On Protocols for Information Security Services. PhD thesis.
Joseph, Jobin (2011) Iris Database Classification and Indexing. MTech thesis.
Krishnankutty, Deepak (2009) Implementation of a Generic Modular Cryptosystem for the RSA on Reconfigurable Hardware. MTech thesis.
Kumar, Anil (2014) Design and Implementation of Stateful Packet Filtering Firewall and optimization using Binary Decision Diagram. BTech thesis.
Kumar, Pranav and Dungdung, Binay Prakash (2012) An extension of elgamal digital signature algorithm. BTech thesis.
Kumar, Vikas (2014) Efficient identity based signcryption scheme and solution of key-escrow problem. MTech thesis.
Kumar , Nitesh and Reddy, Ranabothu Nithin (2012) Automatic Detection of Fake Profiles in Online Social Networks. BTech thesis.
Kumar T, Aswani (2013) An Improved Packet size Entropy Based DoS Attack Detection Scheme. MTech thesis.
Levaka, Ravi Teja Reddy (2011) Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks. MTech thesis.
M S S A, Raghuveer (2012) Hardware Implementation of Densely Packed Decimal Encoding-An optimized approach supporting run-time user input. BTech thesis.
Mishra, Aastha (2014) Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management Scheme. MTech thesis.
Mishra, S and Sahoo, T R (2014) A survey on group signature schemes. BTech thesis.
Mittal, Piyush (2013) A Fast and Secure Way to Prevent SQL Injection Attacks using Bitslice Technique and GPU Support. MTech thesis.
Mohanty , B K and Deoghare, S M and M, Ezhilarasan (2010) Implementation of a Secure Internet Voting Protocol. BTech thesis.
Mohapatra, Ramesh Kumar (2010) Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography. MTech thesis.
Muduli, J P and Parida, S K (2010) A Blind Signature Scheme using Biometric Feature Value. BTech thesis.
Mukherjee, Sourav (2011) FPGA based Network Security Architecture for High Speed Networks. MTech thesis.
Mutchukota, Thrinatha Reddy (2011) Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing. MTech thesis.
Nag, Kaustav and Birua, Mihir (2012) Implementing Symmetric Cryptographic Techniques in Online fee Payment System of NIT Rourkela. BTech thesis.
Nayak, A (2014) Review on multisignature schemes based upon DLP. BTech thesis.
Nayak, B (2014) Signcryption schemes based on elliptic curve cryptography. MTech thesis.
Nayak, Sanjeet Kumar (2013) Blind Signature Schemes using Elliptic Curve Cryptography. MTech thesis.
Pal, A K (2014) Achieving k-anonymity using full domain generalization. MTech thesis.
Panda, Suryakanta (2013) Time Stamped Proxy Blind Signature Scheme
Panigrahy, S K (2008) A Secure Template Generation Scheme for Palmprint Recognition Systems. MTech thesis.
Paramanik, Subhasish (2014) Comparison of Zero Knowledge Authentication Protocols. BTech thesis.
Parida, R R and Satapathy, B (2014) Offline e-cash system. BTech thesis.
Pawa, Taran Deep Singh (2011) Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. BTech thesis.
Pradhan, Srikanta (2013) Proxy Blind Signature using Hyperelliptic Curve Cryptography. MTech thesis.
Prakash, S and Behera, S (2010) Study and Implementation of 3G Mobile Security. BTech thesis.
Prasoon , P S (2011) Security Framework against Denial of Service Attacks in Wireless Mesh Networks. MTech thesis.
Pravinbhai, Munjpara Priyesh (2014) Implementation of multi-tier authentication technique for single-sign on access of cloud services. MTech thesis.
Puthal, Deepak (2012) Secure data collection and critical data transmission technique in mobile sink wireless sensor networks. MTech thesis.
Rana, Yashveer (2012) Evasion and Detection of Metamorphic Viruses. BTech thesis.
Raphique, R and Ekka, B (2010) Forward Static Program Slicing. BTech thesis.
Rewapati, Lokendra (2014) Identity based blind signaturescheme based upon DLP. MTech thesis.
Rout, Jitendra Kumar (2013) An Improved Certificateless Generalized Signcryption Scheme. MTech thesis.
Sachdev, M (2014) Wireless intrusion detection system using fingerprinting. MTech thesis.
Sah, S K (2014) Survey on XML encryption. MTech thesis.
Sahoo, Pravat Kumar and Lenka, Mrutyunjaya (2012) Development of a certificate less digital signature
Sahu, Beeren (2015) Development of Local Feature Extraction and Reduction Schemes for Iris Biometrics. MTech by Research thesis.
Sarangi, A and Panchamukhi, S (2010) Blocking SQL Injection in Database Stored Procedures. BTech thesis.
Satapathy, S R (2014) Threat modeling in web applications. MTech thesis.
Sukhadarshini, Shubhanwita (2012) A novel blind signature scheme and its variations based on DLP. MTech thesis.
Sulanki, Kamlesh (2011) Pipelined Implementation of Densely Packed Decimal Encoding. BTech thesis.
Swain, Biswa Ranjan (2009) Mitigation of DDoS Attack using a Probabilistic Approach &
Swain, Shanti Swaroop (2012) Analysis and Improvements in Trojan Designing. BTech thesis.
Telugu, Praveen Kumar and Saha, Siddarth (2010) Network intrusion detection using string matching. BTech thesis.
Verma, Manish (2013) k-Anonymity using Two Level Clustering. MTech thesis.
Vimal, S (2014) An energy efficient intrusion detection system in MANET for secure routing and clustering. MTech thesis.
Y S, Rajath (2013) A Novel way of Improving CPU Utilization In Cloud. MTech thesis.