Ph.D Technology,Computer Engineering,University of Mumbai.
M.E. Computer Engineering,University of Mumbai
From Date |
To Date |
Designation |
Organization |
Organization Address |
2003-10-01 |
2010-03-31 |
Lecturer |
Department of Computer Engineering,SIES Graduate School of Technology |
Sector 5,Nerul |
2010-04-01 |
2015-06-30 |
Assistant Professor |
Department of Computer Engineering,SIES Graduate School of Technology |
Sector 5,Nerul |
2015-07-01 |
2021-06-30 |
Associate Professor |
Department of Computer Engineering,SIES Graduate School of Technology |
Sector 5,Nerul |
2021-07-01 |
2023-06-13 |
Professor |
Department of Computer Engineering,SIES Graduate School of Technology |
Sector 5,Nerul |
Date |
Title |
Type |
Level |
Academic Year |
2014-01-01 |
CRYPTOGRAPHY BASED ON COLOR SUBSTITUTION |
Presented And Published |
International |
2014-2015 |
2016-03-04 |
USE OF PROXY SIGNATURE IN E-GOVERNANC |
Presented And Published |
International |
2015-2016 |
2017-12-20 |
ECC BASED PROXY SIGNATURE SCHEME WITH FORWARD SECURITY |
Presented And Published |
International |
2017-2018 |
2018-02-12 |
A SECURE E-GOVERNANCE MODEL USING ROLE-BASED DELEGATION |
Presented And Published |
International |
2017-2018 |
2022-06-15 |
Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems |
Book Chapter |
|
2021-22 |
Date |
Title |
Presented/Published |
Level |
Academic Year |
Organizer / Venue |
2014-01-01 |
CRYPTOGRAPHY BASED ON COLOR SUBSTITUTION |
Presented And Published |
International |
2014-2015 |
International Journal Of Computer Applications Computer Lab |
The Emerging Threats To Information Security Are Increasing At An Alarming Rate. The Most Influential And Universal Approach To Counter Such Threats Is Encryption. Traditional Encryption Techniques Use Substitution And Transposition. Substitution Techniques Map Plaintext Into Ciphertext. In All Traditional Substitution Techniques, Characters, Numbers And Special Symbols Are Substituted With Other Characters, Numbers And Special Symbols. In This Paper, An Innovative Cryptographic Substitution Method Is Proposed To Generate A Stronger Cipher Than The Existing Substitution Algorithms. This Method Emphasizes On The Substitution Of Characters, Numbers And Special Symbols With Color Blocks. This Algorithm Of Substitution Is Based On Play Color Cipher. The Cryptanalysis Done On This Will Prove That The Cipher Is Strong. Computer SciencePublished 2014 DOI:10.5120/15967-5355 |
2016-03-04 |
USE OF PROXY SIGNATURE IN E-GOVERNANCE |
Presented And Published |
International |
2015-2016 |
Proceedings Of The Second International Conference On Information And Communication Technology For Competitive Strategies Auditorium,Pacific College,Udiapur,India |
E-Governance Aims At Producing Citizen Centric Services Ensuring Services Transparency With Various Government Agencies. The Process Of Approving Or Disapproving The Application Is Marked By Digitally Signing And Forwarding The E-documents. Present Digital Signature Scheme Provides The Required Security Using Identity Based Authentication Mechanism, But In Case Of Delegating Power To Third Party Authority For Short Period Requires Additional Scheme Ie Proxy Signature System A Variant Of Digital Signature. Furthermore The Identity Based Authentication Scheme Required To Be Changed To Role Base Authentication Using Proxy Signatures To Protect From Signature Forgery Attack And Misuse By Delegated Authority. |
2017-12-20 |
ECC BASED PROXY SIGNATURE SCHEME WITH FORWARD SECURITY |
Presented And Published |
International |
2017-2018 |
Springer Publication ,ICIIT 2017 International Conference On Intelligent Information Technologies, , Anna University, Chennai, Tamilnadu, India College Of Engineering Guindy, Anna University, Chennai, |
The Proxy Signatures Have Fascinated Many Applications Which Entail Delegating Signing Rights Or Power Of Decision Making To Parties. Applications Demanding Multilevel Authority Delegation Can Be Implemented Using Forward Secured Proxy Systems Distinctly From Traditional Use Of Forward Secrecy In Terms Of Protecting The Signed Documents From Leakage By Key Exposure Attack. In Pre-sent Decade, Focus Shift From Using Traditional Desktop Environment To Portable Mobile Devices As Well Secured IOT’s Using Digital Signature Or Proxy Signature. Elliptic Curve Cryptography (ECC) Based Proxy Signature Algorithms With Forward Secrecy Is The Effective Alternative To The Traditional Digital Signature Scheme In Constrained Resources. In This Paper, Our Exclusive Focus Is On Forward Secure Proxy Signature Scheme Using ECC Which Deals With Proxy Key Pair Generation And Forward Secure The Proxy Secret Key. |
2018-02-12 |
A SECURE E-GOVERNANCE MODEL USING ROLE-BASED DELEGATION |
Presented And Published |
International |
2017-2018 |
Third International Congress On Information And Communication Technology ICICT 2018, London, Springer Singapore |
E-governance Services Are Widespread With The Digital India Drive. These Services Allow The Confidential Documents Of Citizens Being Stored With Government In Secured Manner. Authorized Users Are Allowed To Access These Documents. Currently, Digital Signatures Are Used As A Means Of Authentication. For The Purpose Of Improving The Efficiency And Transparency Of The E-governance System, The Task Delegation Can Be Performed. We Propose The Novel Method Of Role Delegation By Using Proxy Signature Scheme In Forward Secure Manner. The Proposed Method Is Designed Using Elliptic Curve Cryptosystem (ECC) To Make It Suitable For Portable Devices. DOI Https://doi.org/10.1007/978-981-13-1165-9_82 |
Date |
Title |
Type |
Level |
Role |
Venue |
2017-07-07 |
FACULTY DEVELOPMENT PROGRAM |
|
LOCAL |
RESOURCE PERSON |
Computer Lab |
2018-11-15 |
FACULTY DEVELOPMENT PROGRAM |
|
LOCAL |
PARTICIPANT |
IT Lab,IT Department,SIES Graduate School Of Technology |
2019-07-27 |
WORKSHOP |
|
LOCAL |
RESOURCE PERSON |
Computer Lab,Computer Department SIES Graduate School Of Technology,Nerul,Navi Mumbai |
Date |
Title |
Details |
0000-00-00 |
|
|
Academic Year |
Type |
Details |
2019-2020 |
Personal |
Completed Ph.D. In Technology (Computer Engineering) From Mumbai University In The Domain Of Proxy Signature Security |