Skip to main content

Showing 1–5 of 5 results for author: Maurya, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.05469  [pdf, ps, other

    cs.CR math.RA

    Linear complementary dual code-based Multi-secret sharing scheme

    Authors: Haradhan Ghosh, Sanjit Bhowmick, Pramod Kumar Maurya, Satya Bagchi

    Abstract: Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a s… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: 12 pages

    MSC Class: 94A62; 94B05; 13H05

  2. arXiv:2105.14195  [pdf, other

    cs.CV

    A Survey of Performance Optimization in Neural Network-Based Video Analytics Systems

    Authors: Nada Ibrahim, Preeti Maurya, Omid Jafari, Parth Nagarkar

    Abstract: Video analytics systems perform automatic events, movements, and actions recognition in a video and make it possible to execute queries on the video. As a result of a large number of video data that need to be processed, optimizing the performance of video analytics systems has become an important research topic. Neural networks are the state-of-the-art for performing video analytics tasks such as… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  3. arXiv:2102.08942  [pdf, ps, other

    cs.DB

    A Survey on Locality Sensitive Hashing Algorithms and their Applications

    Authors: Omid Jafari, Preeti Maurya, Parth Nagarkar, Khandker Mushfiqul Islam, Chidambaram Crushev

    Abstract: Finding nearest neighbors in high-dimensional spaces is a fundamental operation in many diverse application domains. Locality Sensitive Hashing (LSH) is one of the most popular techniques for finding approximate nearest neighbor searches in high-dimensional spaces. The main benefits of LSH are its sub-linear query performance and theoretical guarantees on the query accuracy. In this survey paper,… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    MSC Class: H.2.4 ACM Class: H.2.4

  4. arXiv:1801.00308  [pdf, ps, other

    cs.CR

    Cyclic group based mutual authentication protocol for RFID system

    Authors: Pramod Kumar Maurya, Satya Bagchi

    Abstract: Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals are in the literature to avoid these concerns, but most of them provides reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search com… ▽ More

    Submitted 31 December, 2017; originally announced January 2018.

    Comments: 11 pages, 3 figures, 3 tables

  5. arXiv:1709.01825  [pdf, ps, other

    cs.IT

    Generalized twisted centralizer codes

    Authors: Joydeb Pal, Pramod Kumar Maurya, Shyambhu Mukherjee, Satya Bagchi

    Abstract: An important code of length $n^2$ is obtained by taking centralizer of a square matrix over a finite field $\mathbb{F}_q$. Twisted centralizer codes, twisted by an element $a \in \mathbb{F}_q$, are also similar type of codes but different in nature. The main results were embedded on dimension and minimum distance. In this paper, we have defined a new family of twisted centralizer codes namely gene… ▽ More

    Submitted 7 September, 2017; v1 submitted 6 September, 2017; originally announced September 2017.