Center for Security, Theory and Algorithms

The goal of the center is to do research in information security, theory and algorithms. Center for Security, Theory and Algorithms (CSTAR) is engaged in devising efficient algorithms for various problems, modeling and abstractization of various concepts, and security guarantees of the computation when operating in an adverse environment. Some of the problems lie at the intersection of multiple domains and require a combination of theoretical rigor and practical acceptability. The center is working on several cutting edge problems in several areas. Some of these areas are: - Distributed and multi-core algorithms, system and network security, data structures, secure multiparty computation, and the like. - Distributed algorithms for symmetry breaking via randomization, and a formal study of fault-tolerance of distributed computing - Secure solutions for problems arising in the field of system security and network security. - Secure algorithms for computer vision based problems such as video surveillance, security of robotic systems. - Efficient implementations of parallel algorithms on present generation architectures such as the GPU, the IBM Cell, and other multi-core architectures.


S No. Title Poster Video
01 Revocation and Reconstruction of Shared Quantum Secret P-01 V-01
02 Witnessing Negative Conditional Entropy P-02 V-02
03 Parallel algorithms for multi-source BFS and its applications P-03 V-03
04 Diameter calculation in Incremental graphs P-04 V-04
05 Percolation Centrality P-05 V-05
06 Generating Efficient Block Sparse Neural Networks using RBGP Framework P-06 V-06
07 Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring P-07 V-07
08 Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming P-08 V-08
09 AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE P-09 V-09
10 Blockchain-based batch authentication protocol for Internet of Vehicles P-10 V-10
11 Consortium blockchain-enabled access control mechanism in edge computing based generic IoT environment P-11 V-11
12 Classification of maps which benefit from indefinite causal order - P-12 V-12
13 Witnessing Negative Conditional Entropy P-13 V-13


All Posters, All Videos