MAKE AN ENQUIRY
Home > Faculty

Serving SIES for more than 19 year(s).

bannore.aparna@siesgst.ac.in

Dr. Aparna Manish Bannore

Professor & Head of the department
COMPUTER ENGINEERING



Ph.D Technology,Computer Engineering,University of Mumbai.
M.E. Computer Engineering,University of Mumbai
Course Title Material URL
Course Material Link View Material
From Date To Date Designation Organization Organization Address
2003-10-01 2010-03-31 Lecturer Department of Computer Engineering,SIES Graduate School of Technology Sector 5,Nerul
2010-04-01 2015-06-30 Assistant Professor Department of Computer Engineering,SIES Graduate School of Technology Sector 5,Nerul
2015-07-01 2021-06-30 Associate Professor Department of Computer Engineering,SIES Graduate School of Technology Sector 5,Nerul
2021-07-01 2023-06-13 Professor Department of Computer Engineering,SIES Graduate School of Technology Sector 5,Nerul
Date Title Type Level Academic Year
2014-01-01 CRYPTOGRAPHY BASED ON COLOR SUBSTITUTION Presented And Published International 2014-2015
2016-03-04 USE OF PROXY SIGNATURE IN E-GOVERNANC Presented And Published International 2015-2016
2017-12-20 ECC BASED PROXY SIGNATURE SCHEME WITH FORWARD SECURITY Presented And Published International 2017-2018
2018-02-12 A SECURE E-GOVERNANCE MODEL USING ROLE-BASED DELEGATION Presented And Published International 2017-2018
2022-06-15 Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems Book Chapter 2021-22
Date Title Presented/Published Level Academic Year Organizer / Venue
2014-01-01 CRYPTOGRAPHY BASED ON COLOR SUBSTITUTION Presented And Published International 2014-2015 International Journal Of Computer Applications
Computer Lab
The Emerging Threats To Information Security Are Increasing At An Alarming Rate. The Most Influential And Universal Approach To Counter Such Threats Is Encryption. Traditional Encryption Techniques Use Substitution And Transposition. Substitution Techniques Map Plaintext Into Ciphertext. In All Traditional Substitution Techniques, Characters, Numbers And Special Symbols Are Substituted With Other Characters, Numbers And Special Symbols. In This Paper, An Innovative Cryptographic Substitution Method Is Proposed To Generate A Stronger Cipher Than The Existing Substitution Algorithms. This Method Emphasizes On The Substitution Of Characters, Numbers And Special Symbols With Color Blocks. This Algorithm Of Substitution Is Based On Play Color Cipher. The Cryptanalysis Done On This Will Prove That The Cipher Is Strong. Computer SciencePublished 2014 DOI:10.5120/15967-5355
2016-03-04 USE OF PROXY SIGNATURE IN E-GOVERNANCE Presented And Published International 2015-2016 Proceedings Of The Second International Conference On Information And Communication Technology For Competitive Strategies
Auditorium,Pacific College,Udiapur,India
E-Governance Aims At Producing Citizen Centric Services Ensuring Services Transparency With Various Government Agencies. The Process Of Approving Or Disapproving The Application Is Marked By Digitally Signing And Forwarding The E-documents. Present Digital Signature Scheme Provides The Required Security Using Identity Based Authentication Mechanism, But In Case Of Delegating Power To Third Party Authority For Short Period Requires Additional Scheme Ie Proxy Signature System A Variant Of Digital Signature. Furthermore The Identity Based Authentication Scheme Required To Be Changed To Role Base Authentication Using Proxy Signatures To Protect From Signature Forgery Attack And Misuse By Delegated Authority.
2017-12-20 ECC BASED PROXY SIGNATURE SCHEME WITH FORWARD SECURITY Presented And Published International 2017-2018 Springer Publication ,ICIIT 2017 International Conference On Intelligent Information Technologies, , Anna University, Chennai, Tamilnadu, India
College Of Engineering Guindy, Anna University, Chennai,
The Proxy Signatures Have Fascinated Many Applications Which Entail Delegating Signing Rights Or Power Of Decision Making To Parties. Applications Demanding Multilevel Authority Delegation Can Be Implemented Using Forward Secured Proxy Systems Distinctly From Traditional Use Of Forward Secrecy In Terms Of Protecting The Signed Documents From Leakage By Key Exposure Attack. In Pre-sent Decade, Focus Shift From Using Traditional Desktop Environment To Portable Mobile Devices As Well Secured IOT’s Using Digital Signature Or Proxy Signature. Elliptic Curve Cryptography (ECC) Based Proxy Signature Algorithms With Forward Secrecy Is The Effective Alternative To The Traditional Digital Signature Scheme In Constrained Resources. In This Paper, Our Exclusive Focus Is On Forward Secure Proxy Signature Scheme Using ECC Which Deals With Proxy Key Pair Generation And Forward Secure The Proxy Secret Key.
2018-02-12 A SECURE E-GOVERNANCE MODEL USING ROLE-BASED DELEGATION Presented And Published International 2017-2018 Third International Congress On Information And Communication Technology
ICICT 2018, London, Springer Singapore
E-governance Services Are Widespread With The Digital India Drive. These Services Allow The Confidential Documents Of Citizens Being Stored With Government In Secured Manner. Authorized Users Are Allowed To Access These Documents. Currently, Digital Signatures Are Used As A Means Of Authentication. For The Purpose Of Improving The Efficiency And Transparency Of The E-governance System, The Task Delegation Can Be Performed. We Propose The Novel Method Of Role Delegation By Using Proxy Signature Scheme In Forward Secure Manner. The Proposed Method Is Designed Using Elliptic Curve Cryptosystem (ECC) To Make It Suitable For Portable Devices. DOI Https://doi.org/10.1007/978-981-13-1165-9_82
Date Title Type Level Role Venue
2017-07-07 FACULTY DEVELOPMENT PROGRAM LOCAL RESOURCE PERSON Computer Lab
2018-11-15 FACULTY DEVELOPMENT PROGRAM LOCAL PARTICIPANT IT Lab,IT Department,SIES Graduate School Of Technology
2019-07-27 WORKSHOP LOCAL RESOURCE PERSON Computer Lab,Computer Department SIES Graduate School Of Technology,Nerul,Navi Mumbai
Date Title Details
0000-00-00
Academic Year Type Details
2019-2020 Personal Completed Ph.D. In Technology (Computer Engineering) From Mumbai University In The Domain Of Proxy Signature Security

Important Links

FACULTY LOGIN

© 2024 SIES Graduate School Of Technology. All Rights Reserved.
TOP