Tuesday,
December 9, 2014
4:30-10:00 PM
The Showcase Room at the base of the Observatory Tower (next to Research Hall)
Results of the Contest for the Best Project
4:30 - 4:40 |
|
|
by Kris Gaj |
4:40 - 4:55 |
|
|
by Yashwanth Gazula, Jaswant Katragadda, Dibyojyoti |
4:55 - 5:10 |
|
|
by Raghunath Pasumarthi |
5:10 - 5:25 |
Security of Contactless Cards |
by Rajiv Gautham Champati and Ashritha Rasa |
|
5:25 - 5:40 |
Refreshments |
5:40 - 5:55 |
Implementation and Analysis of the PRIMATEs Family of Authenticated Ciphers |
|
by Ahmed Ferozpuri |
5:55 - 6:10 |
|
|
by William Diehl |
6:10 - 6:25 |
|
|
by Jeremy Trimble |
6:25 - 6:40 |
FPGA Implementation of an Error Correcting Code for Physical Unclonable Functions |
by Brian Jarvis |
|
6:40 - 7:00 |
Refreshments |
7:00 - 7:15 |
|
|
by Tejas Dakve and Jason Hiney |
7:15 - 7:30 |
|
|
by Sai Praveen Sadhu |
7:30 - 7:45 |
Survey of Codebreaking Machines |
by Swathi Guruduth, Vivekanand Kamanuri, Harshad Patil |
|
7:45 - 8:00 |
Refreshments |
8:00 - 8:15 |
Implementation and Simulation of SSL in Windows Presentation Foundation |
|
by Vikram Gawade and Harsh Vachharajani |
8:15 - 8:30 |
|
|
by Jaya Surya Dondapati, Akshay Reddy Veerayyagari, and Avinash Yeluri |
8:30 - 8:45 |
|
|
by Shiting Pan and Sicheng Peng |
8:45 - 9:00 |
Secure E-mail Client for Mobile Devices |
by Ekta Binwani, Akhil Kumar, and Jatin Virmani |
|
9:00 - 9:15 |
Refreshments |
9:15 - 9:30 |
Analyzing the Security Schemes of Various Cloud Storage Services |
|
by Gagandeep Singh Bamrah and Ankita Pandey |
9:30 - 9:45 |
|
|
by Giri-Praneeth Kommalapati and Venkat Raman Sriperumbudur |
9:45 - 10:00 |
Analysis of Different Fully Homomorphic Encryption Schemes |
by Vincent Dasari, Arun Bhargav Palaparthy, Kalyan Peddinti |
|
10:00 |
Closing Remarks |