Items where Subject is "Engineering and Technology > Computer and Information Science > Information Security"

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Creators | Item Type
Jump to: | . | A | B | C | F | G | J | K | L | M | N | P | R | S | T | V | Y
Number of items at this level: 54.

Baral, Sanjib Kumar and Dash, Sourav (2013) Development of Time-Stamped Signcryption Scheme and its Application in E-Cash System. BTech thesis.

Devi, Kshetrimayum Jenita (2013) A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique. BTech thesis.

Gupta, Vikash Kumar (2013) Novel Schemes for Authentication. BTech thesis.

Iyer, Vinay (2013) Group signature Scheme resistant against Colluding Attack. MTech thesis.

Jena, Ankita (2013) Improved authentication mechanism based on elliptic curve cryptography. BTech thesis.

Mohanty, Manoj Kumar (2013) Secure Data Storage on the Cloud using Homomorphic Encryption. MTech thesis.

Mudgil, Pushpendra and Murmu, Chandni (2013) A Strong Proxy Signature Scheme based on Partial Delegation. BTech thesis.

.

., Lalzirtira (2013) Graphical User Authentication. MTech thesis.

., Prateek (2013) Intrusion Detection Using Self-Training Support Vector Machines. BTech thesis.

A

Agarwal, Keshav (2012) Secure Messaging Service on Google App Engine using ECC and RSA Encryption. BTech thesis.

Aich, Dibyendu (2009) Secure Query Processing by Blocking SQL Injection. MTech thesis.

B

Bakshi, Sambit (2011) Development of Robust Iris Localization and Impairment Pruning Schemes. MTech thesis.

Biswal, Baikuntha Narayan (2010) Test Case Generation and Optimization of Object-Oriented Software using UML Behavioral Models. MTech by Research thesis.

Biswal, Biswa Bhusan and Mangal, Sukanta Kumar (2012) A Novel Blind Signature Scheme Based On Discrete Logarithm Problem With Un-traceability. BTech thesis.

C

Chauhan, S K (2010) A Study of Inference Control Techniques. BTech thesis.

Chhotaray, Animesh Chhotaray and Samal, Abhijit Samal (2011) A Novel Blind Signature Based Upon ECDLP. BTech thesis.

F

Faruk, Imran Hossain (2013) A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network. MTech thesis.

G

Gupta, M K (2010) Hardware Implementation of Densely Packed Decimal Encoding. BTech thesis.

J

Jena, Biswajit and Mishra, Gouri Sankar (2011) A novel group signature scheme without one way hash. BTech thesis.

Jena, Debasish (2010) On Protocols for Information Security Services. PhD thesis.

Joseph, Jobin (2011) Iris Database Classification and Indexing. MTech thesis.

K

Krishnankutty, Deepak (2009) Implementation of a Generic Modular Cryptosystem for the RSA on Reconfigurable Hardware. MTech thesis.

Kumar, Pranav and Dungdung, Binay Prakash (2012) An extension of elgamal digital signature algorithm. BTech thesis.

Kumar , Nitesh and Reddy, Ranabothu Nithin (2012) Automatic Detection of Fake Profiles in Online Social Networks. BTech thesis.

Kumar T, Aswani (2013) An Improved Packet size Entropy Based DoS Attack Detection Scheme. MTech thesis.

L

Levaka, Ravi Teja Reddy (2011) Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks. MTech thesis.

M

M S S A, Raghuveer (2012) Hardware Implementation of Densely Packed Decimal Encoding-An optimized approach supporting run-time user input. BTech thesis.

Mittal, Piyush (2013) A Fast and Secure Way to Prevent SQL Injection Attacks using Bitslice Technique and GPU Support. MTech thesis.

Mohanty , B K and Deoghare, S M and M, Ezhilarasan (2010) Implementation of a Secure Internet Voting Protocol. BTech thesis.

Mohapatra, Ramesh Kumar (2010) Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography. MTech thesis.

Muduli, J P and Parida, S K (2010) A Blind Signature Scheme using Biometric Feature Value. BTech thesis.

Mukherjee, Sourav (2011) FPGA based Network Security Architecture for High Speed Networks. MTech thesis.

Mutchukota, Thrinatha Reddy (2011) Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing. MTech thesis.

N

Nag, Kaustav and Birua, Mihir (2012) Implementing Symmetric Cryptographic Techniques in Online fee Payment System of NIT Rourkela. BTech thesis.

Nayak, Sanjeet Kumar (2013) Blind Signature Schemes using Elliptic Curve Cryptography. MTech thesis.

P

Panda, Suryakanta (2013) Time Stamped Proxy Blind Signature Scheme
With Proxy Revocation Based on
Discrete Logarithm Problem.
MTech thesis.

Panigrahy, S K (2008) A Secure Template Generation Scheme for Palmprint Recognition Systems. MTech thesis.

Pawa, Taran Deep Singh (2011) Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. BTech thesis.

Pradhan, Srikanta (2013) Proxy Blind Signature using Hyperelliptic Curve Cryptography. MTech thesis.

Prakash, S and Behera, S (2010) Study and Implementation of 3G Mobile Security. BTech thesis.

Prasoon , P S (2011) Security Framework against Denial of Service Attacks in Wireless Mesh Networks. MTech thesis.

Puthal, Deepak (2012) Secure data collection and critical data transmission technique in mobile sink wireless sensor networks. MTech thesis.

R

Rana, Yashveer (2012) Evasion and Detection of Metamorphic Viruses. BTech thesis.

Raphique, R and Ekka, B (2010) Forward Static Program Slicing. BTech thesis.

Rout, Jitendra Kumar (2013) An Improved Certificateless Generalized Signcryption Scheme. MTech thesis.

S

Sahoo, Pravat Kumar and Lenka, Mrutyunjaya (2012) Development of a certificate less digital signature
scheme & implementation in e-cash system.
BTech thesis.

Sarangi, A and Panchamukhi, S (2010) Blocking SQL Injection in Database Stored Procedures. BTech thesis.

Sukhadarshini, Shubhanwita (2012) A novel blind signature scheme and its variations based on DLP. MTech thesis.

Sulanki, Kamlesh (2011) Pipelined Implementation of Densely Packed Decimal Encoding. BTech thesis.

Swain, Biswa Ranjan (2009) Mitigation of DDoS Attack using a Probabilistic Approach &
End System based Strategy.
MTech thesis.

Swain, Shanti Swaroop (2012) Analysis and Improvements in Trojan Designing. BTech thesis.

T

Telugu, Praveen Kumar and Saha, Siddarth (2010) Network intrusion detection using string matching. BTech thesis.

V

Verma, Manish (2013) k-Anonymity using Two Level Clustering. MTech thesis.

Y

Y S, Rajath (2013) A Novel way of Improving CPU Utilization In Cloud. MTech thesis.

This list was generated on Thu Apr 24 07:29:04 2014 IST.