Now showing items 1-5 of 5

    • Collusion resistant fingerprinting 

      Juneja, Sandeep (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Digital watermarking is used to carry information by embedding information into the cover data in a perceptually visible or non visible manner. In today's sea of digital information, there are many problems associated ...
    • Efficient ASIC implementation of advanced encryption standard 

      Joshi, Ashwini Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
    • Modeling and detecting attacks against key agreement protocols 

      Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Wireless LAN 802.11 security using elliptic curve cryptography 

      Singh, Saurabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. ...