• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-5 of 5

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Opacity and its Trade-offs with Security in Linear Dynamical Systems 

    John, Varkey M
    Opacity is notion of privacy that is well-studied in computer science and discrete-event systems. In our work, we extend the opacity notion to linear dynamical systems. Opacity describes an eavesdropper’s inability to ...

    Honest Majority and Beyond: Efficient Secure Computation over Small Population 

    Singla, Swati
    Secure Multi-Party Computation for small population has witnessed notable practically-efficient works in the setting of both honest majority and dishonest majority. While honest majority provides the promise of stronger ...

    Practically Efficient Secure Small Party Computation over the Internet 

    Byali, Megha
    Secure Multi-party Computation (MPC) with small population has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer. Practically efficient constructions ...

    Enhancing Privacy and Efficiency of Distributed Encryption 

    Chakrabarti, Anirban
    The primary objective of a distributed system is to eliminate reliance on a central authority. In a distributed encryption scheme, users should be able to generate their key materials independently while securely sharing ...

    Protecting Deep Learning Models on Cloud Platforms with Trusted Execution Environments 

    Shanker, Kripa
    Deep learning is rapidly integrated into different applications, from medical imaging to financial products. Organisations are spending enormous financial resources to train deep learning models. Often, many organisations ...

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorByali, Megha (1)Chakrabarti, Anirban (1)John, Varkey M (1)Shanker, Kripa (1)Singla, Swati (1)Subject
    Security (5)
    TECHNOLOGY (5)
    BoBW model (1)Cloud platform (1)Could security (1)Cryptography (1)deduplication (1)Deep Learning (1)edit distance (1)Encryption schemes (1)... View MoreHas File(s)
    Yes (5)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV