Search
Now showing items 71-80 of 209
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Embedding binary trees and caterpillars into the hypercube
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Embedding graphs is an important and well-studied theory in parallel computing. Finding the embedding of trees into hypercubes is an important, interesting and difficult problem. This work studies the embedding of binary ...
Analysis and modeling of power distribution network and decoupling network design strategies for high speed digital and analog VLSI system
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
Today’s high speed digital and analog VLSI systems are operating in GHz frequency range. With high switching rate of the devices, power distribution network (PDN) impedance causes ripples in power supply. If PDN is not ...
Comparative study between exponential back off and dynamic waiting strategies for medium access in wireless ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
IEEE 802.11 DCF (IEEE 802.11 Distributed Coordination Function) is widely used MAC protocol for wireless channel access. Although it is developed for single hop networks where all nodes are in the same radio range, it can ...
On path complexities of heapsort algorithm and the class stack
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
A measure of program complexity, called Path Complexity, based on the number of program execution paths as a function of the input size n, is proposed in [AJ05]. This measure can be used to compare the complexity of two ...
Selfish routing and network creation games
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
This work studies the two important problems of routing and network creation in the situation of selfish behavior of agents. In routing, agents want to send their data from source to destination. They try to reduce cost ...
Design of CDMA transmitter and three finger rake receiver
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
As cellular wireless communication becomes a worldwide communication standard, it is important in studying how data communications happens in a cellular system. In this Thesis work CDMA transmitter and receiver have been ...
Context aware semantic service discovery
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
This report is a part of an effort to develop a novel context based mechanism to facilitate semantic service discovery. Context- awareness is considered to be a key problem in designing more adaptive applications. Context ...
Improved algorithms for modular multiplication and its application to block cipher RC6
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
This thesis explores the area of hardware implementation of block ciphers. An al¬gorithm for modular multiplication is proposed which is efficient in terms of speed and area. To demonstrate the effectiveness of the algorithm ...
Classification of quantum cryptography
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ...