Cyber Security Research Group@DA-IICT

2012 - 2006

Journal Papers:

  • Chandrapal Chahar, Vishal S Chauhan and Manik Lal Das. Code Analysis for Software and System Security using Open Source Tools. Information Security Journal: A Global Perspective, Vol. 21, No. 6, pp. 346-352, 2012.
  • Siva C Muraharirao and Manik Lal Das. Digital Image Protection using Keyed Hash Function. International Journal of Computer Vision and Image Processing (IJCVIP), Vol. 2, No. 2, pp. 36-47, 2012.
  • Anil Mundra, Naveen Kumar, Anish Mathuria and Manik Lal Das. Detecting flaws in dynamic hierarchical key management schemes using specification animation. CSI Journal of Computing, vol. 1, No. 02, pp. 73-79, ISSN 2277-6702, 2012.
  • Manik Lal Das. A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel. Cryptologia, vol. 35, No. 01, pp. 58-72, ISSN 0161-1194, Jan 2011.
  • Shamik Sural and Vijayalakshmi Atluri. Security analysis of GTRBAC and its variants using model checking. Computers and security, Elsevier, 2010.
  • Manik Lal Das. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, vol. 08, no. 03, pp. 1086-1090, 2009.
  • Thulasi Goriparthi, Manik Lal Das and A. Saxena. An improved bilinear pairing based remote user authentication scheme. Computer Standards and Interfaces,vol. 31, no. 1, pp. 181-185, 2009.
  • Praneetha Bayyapu and Manik Lal Das. An imporved and efficient micro-payment scheme. Journal of theoretical and applied electronic commerce research, vol. 04, no. 01, pp. 91-100, 2009.
  • Samrat Mondal and Shamik Sural. Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach. Journal of Information Assurance and Security (Special issue on Access Control and Protocols),Volume: 4, Issue: 4, pp.319-328, 2009.
  • Subhendu Aich, Samrat Mondal, Shamik Sural and Arun Kumar Majumdar. Role Based Access Control with Spatiotemporal Context for Mobile Applications. Transactions on Computational Science (Special Issue in Security in Computing), Springer, Volume: 4, pp. 177-199, 2009.
  • Manik Lal Das. Comments on "Improved efficient remote user authentication schemes". International Journal of Network Security, vol. 6, no. 3, pp.282-284, 2008.
  • Manik Lal Das and Aakash Joshi. Dynamic program update in wireless sensor networks using orthogonality principles. IEEE Communications Letters, vol. 12, no. 6, pp. 471-473, 2008.
  • Vidhani Kumar and Manik Lal Das. Securing wireless sensor networks with public key techniques. Ad-hoc and Sensor Wireless Networks, vol. 5, no. 3-4, pp. 189-201, 2008.
Conference Papers:
  • Renu Aggarwal and Manik Lal Das. RFID Security in the context of Internet of Things. In Proc. of the International Conference of Security of Internet of Things, ACM Press, India, 2012.
  • Anshu Yadav and Anish Mathuria. Formal Analysis of Key Control in Group Key Agreement Protocols. International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE 2012), LNCS, Springer-Verlag, 2012.
  • Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria and Javier Lopez. A Novel Key update Protocol in Mobile Sensor Networks. In Proc. of the International Conference on Information Systems Security (ICISS 2012), LNCS 7671, pp.194-207, 2012.
  • Anil Mundra, Anish Mathuria and Manik Lal Das. Detecting flaws in dynamic hierarchical key management schemes using specification animation. In Proc. of the 8th International Conference on Distributed Computing and Internet Technologies (ICDCIT 2012), LNCS 7154 Springer, pp.166-176, 2012.
  • C. Anudeep and Manik Lal Das. An Improved Scheme for False Data Filtering in Wireless Sensor Networks. In Proc. of the 8th International Conference on Distributed Computing and Internet Technologies (ICDCIT 2012), LNCS 7154 Springer, pp.62-70, February, 2012.
  • Manik Lal Das. Grids Security without Public Key Settings. In Proc. of the 8th International Conference on Distributed Computing and Internet Technologies (ICDCIT 2012), LNCS 7154 Springer, pp.253-254, February, 2012.
  • Sarita Agrawal and Manik Lal Das. Internet Of Things - a paradigm shift for future Internet. In Proc. of the Second International Conference on Current Trends in Technology (NUiCONE 2011), India, IEEE, 2012.
  • Naveen Kumar, Anish Mathuria and Manik Lal Das. On Classifying Indirect key Assignment Scheme for Hierarchical Access Control. 10th NAtional Workshop on Cryptology, PSG college of Technology, Coimbatore and CRSI, India, pp. 133-139, Sept. 2010.
  • Samrat Mondal and Shamik Sural. Supporting Negative Authorization in Spatiotemporal Role Based Access Control. In Proceedings of First International Workshop on Network and Communications Security (NCS), Chennai, India, IEEE Computer Society Press, pp. 422-427, December 2009.
  • Akar Gupta, Milan Saini and Anish Mathuria. Security Analysis of the Louis Protocol for Location Privacy. In Proceedings of First International Conference on Communication Systems and Networks (COMSNETS 2009), Bangalore, Jan. 5-10, 2009.
  • Samrat Mondal and Shamik Sural. XML-Based Policy Specification Framework for Spatiotemporal Access Control. In Proceedings of Second International Conference on Security of Information and Networks (SIN 2009), Gazimagusa, North Cyprus, pp. 98-103, October 2009.
  • Samrat Mondal, Shamik Sural and Vijayalakshmi Atluri. Towards Formal Security Analysis of GTRBAC using Timed Automata. In Proceedings of 14th ACM Symposium on Access Control Models and Technologies (SACMAT09), Gazimagusa, Stresa, Italy, pp. 33-42, June, 2009.
  • Manik Lal Das. Secure and efficient authentication scheme for remote systems. In Proceedings of International Conference of Information Technology (ICIT 2008), Bhubaneswar, India, Dec. 17-20, pp. 226-231, 2008.
  • Manik Lal Das and Ravi Mukkamala. Revisiting bluetooth security. In Proceedings of 4th International Conference on Information Systems Security (ICISS 2008), (LNCS, vol. 5352), Hyderabad, India, Dec. 16-20, pp.132-139, 2008.
  • Manik Lal Das. Efficient user authentication and secure data transmission in wireless sensor networks. In Proceedings of 16th IEEE International Conference on Networks (ICON 2008), New Delhi, India, Dec. 12-14, pp.1-6, 2008.
  • Samrat Mondal and Shamik Sural. A Verification Framework for Temporal RBAC with Role Hierarchy. In Proceedings of 4th International Conference on Information Systems Security, (ICISS08), Hyderabad, India, pp.140-147, December 2008.
  • Manik Lal Das and V. Narasimhan. A simple and secure authentication and key establishment protocol. In Proceedings of the International Conference on Emerging Trends in Engineering and Technology (ICETET-08), Nagpur, Jul. 16-18, 2008.
  • Manik Lal Das and V. Narasimhan. Towards a formal verification of an authentication protocol using non-monotonic logic. In Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), Las-Vegas, USA, Apr. 7-9, pp. 545-550, 2008.
  • Samrat Mondal and Shamik Sural. Security Analysis of Temporal-RBAC using Timed Automata. 4th International Conference on Information Assurance and Security, (IAS08), Naples, Italy, IEEE Computer Society Press, pp.37-40, September 2008.
  • Aditya Raj Singh, P. Venkata Shravan, Rohit KirtankarSome and Anish Mathuria. New multi-protocol attacks. 15th International Conference on Advanced Computing & Communication (ADCOM 2007 Guwahati, India), pp.18-21 December, 2007.
  • Manik Lal Das. Efficient user authentication and secure data transmission in wireless sensor networks. In Proceedings of 16th IEEE International Conference on Networks (ICON 2008), New Delhi, India, Dec. 12-14, pp.1-6, 2008.
  • Anshul Singhal, Vaibhav Garg and Anish Mathuria. Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. 2nd International Conference on Communication Systems Software and Middleware (COMSWARE'07 Bangalore, India), pp.7-12 January, 2007.
  • Praveen Kumar Vadnala and Anish Mathuria. An Efficient Key Assignment Scheme for Access Control in a Hierarchy. 2nd International Conference on Information Systems Security (ICISS 2006 Kolkata, India), pp.19-21 December, 2006.
  • Raymond Choo, Anish Mathuria and Colin Boyd. An Extension to Bellare-Rogaway Model: Resetting Compromised Long-Term Keys. 11th Australasian Conference on Information Security and Privacy (ACISP 2006 Melbourne, Australia), pp.3-5 July, 2006.
Book Chapters:
  • Manik Lal Das and Aakash Joshi. Dynamic program update in wireless networks. In Security in Ad-hoc & Sensor Networks, (Computer and Network Security), vol. 3, World Scientific Press, pp.369-384, 2009.
  • V. Narasimhan, and Manik Lal Das. Security requires information literacy: A perspective on information security for business, human, social and systemic security. In Issues in Information and Media Literacy: Education, Practice and Pedagogy, Informing Science Press, pp. 257-286, 2009.
Edited Book:
  • Somesh Jha, Anish Mathuria. Information Systems Security - 6th International Conference. ICISS 2010, Gandhinagar, India, December 17-19, Proceedings Springer 2010.


Copyright © 2017 DA-IICT.