INSTITUTIONAL DIGITAL REPOSITORY

Browsing Year-2019 by Author "Chang, D."

Browsing Year-2019 by Author "Chang, D."

Sort by: Order: Results:

  • Chang, D.; Jati, A.; Mishra, S.; Sanadhya, S. K. (2021-08-22)
    Increasing threat of password leakage from compromised password hashes demands a resource consuming password-hashing algorithm to prevent the precomputation of the password hashes. A class of password-hashing schemes (PHS) ...
  • Chang, D.; Ghosh, M.; Sanadhya, S.K.; Singh, M.; White, D.R. (2019-08-23)
    With the rapid growth of the World Wide Web and Internet of Things, a huge amount of digital data is being produced every day. Digital forensics investigators face an uphill task when they have to manually screen through ...
  • Akshima; Chang, D.; Goel, A.; Mishra, S.; Sanadhya, S.K. (2022-08-24)
    Breach in password databases has been a frequent phenomena in the software industry. Often these breaches go undetected for years. Sometimes, even the companies involved are not aware of the breach. Even after they are ...
  • Chang, D.; Datta, N.; Dutta, A.; Mennink, B.; Nandi, M.; Sanadhya, S.; Sibleyras, F. (2021-08-28)
    Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In case of release of unverified plaintext (RUP), an adversary gets separated access to the decryption and verification ...

Search DSpace


Advanced Search

Browse

My Account