Next : Dual Degree (B.Tech.
/ M.Tech.)
Up : Research Guidance
Previous : Master of
Science (By Research)
MASTER OF TECHNOLOGY
- Ambika K., Non-interactive Proxy Re-encryption from Signcryption, (2008).
- Chandrasekar S., Unidirectional Proxy Re-encryption from Signcryption, (2008).
- Shayer Dudekula, Finding the Core of Specified Length in Chordal Graphs, (2008).
- Srinivas A., Finding the Corepath of Sepcified Length in Hamiltonian Permutation Graphs, (2008).
- Vinod Kumar N., On Uniquely Restricted Matching, (2008).
- Anil Kumar Kothuri, Privacy Preservation of Clustering Algorithms, (2007).
- Madhu Gayatri, Perfectly Reliable Message Transmission, (2007).
- Badhrinath Santhaanam, Uniform Random Allocations - Multiple Choice Algorithms with Unfair the Breaking, (2005).
- Karthikeyan K., Implementation of RSA-KEM - An Asymmetric Encryption Primitive, (2005).
- Kiran Prasad Juthi, Empirical Studies of the Weil Pairing Based Techniques, (2005).
- Naresh Sankineni, Studies on Undeniable Signatures, (2005).
- Ramesh Srinivasan, A Study of Private Information Retrieval Schemes, (2005).
- Rosarin Jolly Roy, Uniform Random Allocations - Multiple Choice Algorithms with Random the Breaking, (2005).
- Vasan S., Implementation of RSA-PSS Signature Scheme, (2005).
- Vasanth Kumar B.J., Studies on Digital Signatures, (2005).
- Vinod Kumar P.M., Fair Exchange Protocol for RSA Signatures, (2005).
- Devender Kumar, General Verifiable (k, t, n) Anonymous Encryption Scheme, (2004).
- Hemantraj Batakurki, Verifiable 1-Out-N Anonymous Encryption Scheme, (2004).
- Manjunatha M., An application of Double Signature schemes for Electronic Business Transactions, (2004).
- P. Balasubramaniam, FPGA Realization of Modular Exponentiation for Public Key Cryptography, (2003).
- Binu Raghavan, FPGA Realization of Block Cipher Algorithms - RC6 and Cast 256, (2003).
- K. Indra Kumar, FPGA Realization of Block Cipher Algorithm - IDEA and Rijndael, (2003).
- Kalyan Gupta, FPGA Realization of RIPEMD-160, (2003).
- Rajiv Roy, FPGA Realization of Hash Based Message Authentication Code and Secure Hash Algorithm, (2003).
- Sooraj K Ambat, FPGA Realization of Key Generation for Public Key Algorithms, (2003).
- Tarique Ahsan Nezami MD, FPGA Realization of Message Authentication Code using Universal Hashing, (2003).
- Arvind Kumar, CALTOOL : An Integrated CAL Development Tool-Frame Package and Applets, (1996).
- D.K. Goswami, CALTOOL : An Integrated CAL Development Tool-Info Package and Applets, (1996).
- G.G. RAO, CALTOOL : An Integrated CAL Development Tool-Info Package and Applets, (1996).
- T.Venugopal, Animation of Path Planning Algorithms, (1995).
- Anil Kumar Mishra, DPSEPs: Distributed Problem Solving Environment for Production Systems, (1994).
- Shailesh Durgapal, Multi-Agent Production System for Distributed Problem Solving, (1994).
- Akilandeswari S.,Framework for Distributed Cooperative Problem Solving - I. (1993).
- Balaji Munagala., Parallel Algorithms for Some Classes of Perfect Graphs on the Hypercube. (1993).
- Krishna Shree A., Framework for Distributed Cooperative Problem Solving - II. (1993).
- Vijaya Kumar A.J., A Fast Public Key Encryption Scheme for PC and E-Mail. (1993).
- Laxman., Implementation of a Distributed Production System for Problem Solving in C. (1993).
- Ravi E.S., Performance Study of Parallel Algorithms Using Simulator. (1992).
- Kumar B.S.R., Performance Analysis of Parallel AI Search Algorithms. (1992).
- Sreekumar A.,Performance Analysis of Parallel Algorithms for Partial Differential Equations and 8-Puzzle Problems. (1992).
- Patkar Sachin B., Efficient Parallel Algorithms for Some Linear Matroid Theoretic Problems. (1987).
- Ramprasad P.B., The Two Path Problem and the All Bidirectional Edges Problem on Planar Graphs. (1987).
- Hari Krishna Prasad T., New Sequential and Parallel Algorithms for the Maximum Empty Rectangle Problem. (1986).
- Rama Rao K.N., Implementation of a Normalized Quadtree. (1986).
- Sitalakshmi R., Efficient Two Dimensional Pattern Matching Algorithms. (1986). [Co-guide Prof. Kamala Krithivasan]
- Soundara Lakshmi S., Studies on Maximum Empty Rectangle Problem. (1986).
- Sudarsana Rao P., Linear Feature Quad Tree - A New Representation Scheme for Curvilinear Data. (1986).
- Sulaiman M.K., Computer Recognition of Constrained Handprinted Devanagiri characters. (1986).
- Venkatasubramanian S., Algorithms on Cellular Automata, (1986) [co-guide: Prof. Kamala Krithivasan].
- Vijayalakshmi G., Animation of Algorithms. (1986).
Next : Dual Degree (B.Tech.
/ M.Tech.)
Up : Research Guidance
Previous : Master of
Science (By Research)
E.Boopal (Prof.CPR)
Wed Aug 5 15:36:01 IST 2008