Your IP : 216.73.216.40


Current Path : /var/www/html/venkat/
Upload File :
Current File : //var/www/html/venkat/index.htm

<html><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<title>
Venkat/IIIT
</title>
</head>
<body>

<table bgcolor="lightgrey" border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center" bgcolor="white">
<img src="Venkat_IIIT_files/iiita%2520logo.jpg" height="110" width="100">
</td> 
<td align="center"><b>
<font size="5">Indian Institute of Information Technology,Allahabad</font> 
<br><font size="1">(An Institute of National Importance by Act of Parliament)
</font><br>
A Centre of Excellence in Information Technology, Established by Ministry Of H.R.D., Govt Of India <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
</b></td>

<td align="center" width="10%">
<img src="venk.jpg" height="200" width="250">
</td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center">
<h1><b><font color="blue"><span><span id="dtx-highlighting-item" dtx-highlight-backgroundcolor="lime"> S.VENKATESAN (In Tamil: சு.வெங்கடேசன்) </span></span></font></b> </h1></td>
</tr><tr>
</tr></tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Designation and Address </font> </i></b></td>
<td>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Associate Professor <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Department of Information Technology  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Room Number : 4304 <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Computer Centre - 2(CC-2) <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Indian Institute of Information Technology, Allahabad <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ph. : +  91 532 2922138 <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;E-Mail : <img src="mail1.png"> ,
<img src="mail2.png"> <br>
&nbsp;&nbsp;&nbsp;&nbsp;<b> Associated with :</b> <a href = "/venkat/nsc/"> Network Security & Cryptography (NSC) Lab </a>
</td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">

<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Education</font>  </i></b><br></td><td><align="justify"><ul><li>
Ph.D. - Mobile Agent Security from Department of Computer Science and 
Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010. Thesis Advisor: Prof.C.Chellappan</li><li>
M.Tech. -  Computer Science and Engineering from Bharath Institute of 
Higher Education and Research University,Chennai, Tamilnadu, India in 
2005.</li><li>
B.Tech. -  Computer Science and Engineering from Sri Manakula Vinayagar 
Engineering College affiliated with Pondicherry University, Pondicherry,
 India in 2003. </li><li>
DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000. </li></ul></align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b> <i><font color="lightred">Publications</font></i> </b> <br></td><td><align="justify">
<b>International Journals </b> <br> <ol><li>
Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.</li>
<!--<li> Venkatesan S., Chellappan C., Anurika Vaish, Dhavachelvan P. and Prabhu C., "A Collaborative Model to Mitigate the TCP SYN Flood Attack in IPv4/IPv6 Environment", accepted to publish in International Journal of Information and Computer Security, Inderscience Publishers.</li>--><li>
Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and 
Dhavachelvan P.(2013), "Artificial Immune System based Mobile Agent Platform Protection", International Journal on Computer Standard and Interfaces,Elsevier Standards, Vol.35, No.4,pp.365-373.
</li><li>
Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and 
Dhavachelvan.P (2013), " Analysis of accounting models to detect duplicate 
request in Web Service",  Journal of King Saud 
University - Computer and Information Sciences,Elsevier Standards, Vol.25, No.1,pp.7-24.
</li><li>
Venkatesan S., Chellappan C., Vengattaraman C., Dhavachelvan P. and Anurika
 Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity
 and Malicious Availability Check', International Journal of Computer 
and Network Applications,Elsevier Standards, Vol No.33, pp.661-671. </li><li>
Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance 
analysis of mobile agent failure recovery in E-Service applications', 
International Journal on Computer Standard and Interfaces, Elsevier 
Standards, Vol.32,No.1-2,pp.38-43.</li><li>
Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent 
(FRoMA) Protection against Multiple Attacks', International Journal on 
Communication Networks and Distributed Systems, Inderscience Publishers,
 Vol. 3, No. 4, pp. 362-383. </li><li>
Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of 
Free-Roaming Mobile Agent in Distributed Environment', 
International Journal on Computer standard and Interfaces, Elsevier 
Standards, Vol. 31, No. 2, pp. 428-436. </li><li>
Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming 
Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth 
International Journal, Vol. 4, No. 1, pp. 14-19. </li></ol>

 

<b>International Conferences </b><br><ol>
<li>Venkatesan S et al. (2019), 'Simplification of Compiler Design Course Teaching using Concept Maps', Proceedings of 7th International Conference on Information Technology in Education (ICITE 2019), Sydney, Australia, pp.91-102. </li>
<li>Akansha Pandey, Ezhil S.Kalaimannan and Venkatesan.S (2015), 'An Information Diffusion Model to analyse the behavior of Online Social Network based Malwares', Proceedings of The 2015 International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, pp.867-868. </li>
<li>Preeti Yadav, Savita Gupta and Venkatesan.S (2014), 'Trust model for Privacy in Social Networking using Probablistic Determination', Proceedings of 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014),Madras Institute of Technology, Anna University, Chennai. (Best Paper Award). </li><li>
Ragini, Parul Mehrotra and Venkatesan.S (2014), 'An efficient model for Privacy and Security in Mobile Cloud Computing',Proceedings of the 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014), Madras Institute of Technology, Anna University, Chennai. </li><li> 
Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic 
Data Integrity protection in cloud computing', Proceedings of the 
International Conference on Advances in Communication, Network, and 
Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Identifying the Split 
Personality of the Malicious Host in the Mobile Agent Environment', 
Proceedings of the 2008 IEEE International Conference on Intelligent 
Systems, Bulgaria, pp. 14-40 to 14-44.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent 
Platform through Attack Identification Scanner (AIS) by Malicious 
Identification Police (MIP)', Proceedings of the IEEE International 
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to
 Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment', 
Proceedings of the ACM International Conference on Advances in Computing
 (ICAC 2008), India, pp. 1-4.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free 
Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of 
the IEEE International Conference on Advances in Computer Vision and 
Information Technology(ACVIT'07), India, pp. 16-24. </li><li>
Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming  Mobile
 Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of
 International Conference on Mobile Multimedia 
Communication(MobiMedia'07), Greece, pp. 293-297.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming
 Mobile Agent against Multiple Attacks', ACM Proceedings of 
International Conference on Mobile Multimedia Communication 
(MobiMedia'07), Greece, pp. 275-279. </li><li>
Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered 
Firewall', Proceedings of 1st International Conference on Intelligent 
System and Control(ISCO'06), Coimbatore, India. </li></ol>




<b>Book Chapters </b><br><ol><li>
Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of 
Ubiquitous Multimedia Content Discovery Mobile Agent', published in the 
book named Ubiquitous Multimedia and Mobile Agents: Models and 
Implementations, Editor: Susmit Bagchi IGI Global Publishing Service, 
USA.pp.215-231.</li><li> 
Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based 
Multimedia Content Discovery',  published in the book named Ubiquitous 
Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit 
Bagchi, IGI Global Publishing Service, USA. pp.135-147.</li></ol>


<b>Workshop </b><br><ol><li>
S.Venkatesan, Shubham Sahai Srivastava and Sandeep Kumar Shukla (2017), "Decentralized Authentication for IoT Devices using the Blockchain", accepted to present in the 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges, organized by ISRDC, IIT Bombay, India.</li> 
</ol>


</align="justify"></td>



</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Invited Talks</font></i></b><br></td><td><align="justify"><ol><li>
Title: Vulnerabilities in Network Protocols<br>
TEQIP-II Sponsored National Workshop On Advanced VLSI, Signal processing and Communication network (AVSC-2014), MNNIT, Allahabad, 2014. </li>
<li>
Title: Security Vulnerabilities in the Network Protocols,Improved services and Bitcoin Technique <br>
Five Days National Workshop on Emerging Trends in Communication & Information Technology (COMMIT'17), SHUATS, Allahabad, Jan-Feb 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at Department of Computer Science and Engineering, IIT-Kanpur, 11th March 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at IEEE Computer Society of India Symposium, IIIT - Allahabad, 18th March 2017.
</li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Experience</font></i></b><br></td><td><align="justify"><ol><li>
Research: 2.2 Years in Collaborative Directed Basic research on Smart 
and Secure Environment (SSE) project funded by National Technical 
Research Organization (NTRO), New Delhi as Research/Scientific 
Associate. </li><li>
Teaching: 12 Years. </li></ol>
</align="justify"></td>
</tr>
</tbody></table>


<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Software Development</font></i> </b> <br></td><td><align="justify"><ol><li>
Digital Display Content Copying Protection for Smart and Secure 
Environment project funded by National Technical Research Organization, 
New Delhi </li><li>
Online Examination System for Smart and Secure Environment project 
funded by National Technical Research Organization, New Delhi. </li><li>
Elective and Project Registration Portal for IIIT-Allahabad students. </li> <li>
Online Program (C, C++, Java, Python and Perl) evaluation tool. </li> </ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b> <i><font color="lightred">Courses Teaching</font></i> </b> <br></td>
<td><align="justify">
<br><b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href="http://profile.iiita.ac.in/venkat/course/" target = "_blank">Course Site</a>
</b> <br> 
<!--<ol><li>
Compiler Design</li><li>
Network Security </li><li>
Security Architecture</li></ol>
-->


</align="justify"><br></td>
</tr>
</tbody></table>

<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Interest </font></i> </b> </td><td><align="justify">
<ol><li>Mobile Agent Security </li><li>
Cryptography</li><li>
Blockchain</li><li>
Cloud Computing and Social Network Privacy</li> </ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Team </font> </i> </b></td> <td> <align="justify">
<ol> <li> Dr. Saurabh Prakash <br> PhD <br> Thesis Title: A Privacy Preserving Framework for Data Storage and Retrieval on the Cloud [Completed] </li><li> Mrs.Jaya Singh <br> Research Scholar <br> Research Area: Big Data Security </li><li> Ms.Sumouli <br> M.Tech (IS)[2015] <br> Thesis Title: Lattice based Fully Homomorphic Public Key Cryptosystem on Smaller Key [completed] </li></ol> </align> </td> </tr> </tbody> </table>

<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Professional Membership </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute of Electrical and Electronics Engineers (IEEE) </li><li> Association for Computing Machinery (ACM)</li><li> Cryptology Research Society of India (CRSI) </li></ol> </align> </td> </tr> </tbody> </table>

<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Project </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute one time seed money <br> Electronic Medical Record Management System using Blockchain Technology <br> Cost: Approximate Rs.10 lakhs  <br> Role: Principal Investigator <br> Duration : 1 year [From May 2017] </li>
<li> Department of Science & Technology - ICPS <br>Development of Secure IoT Communication using the Blockchain Technologyr <br> Recommended Cost: ~Rs.36 lakhs <br> Role: Principal Investigator <br> Duration: 3 years August 2019</li> Department of Science & Technology - Indo-Norway Collobarative Project <br> Cyber-Physical Security in Energy Infrastructure of Smart Cities (CPSEC)  <br> Recommended Cost: Approximate Rs.36 lakhs <br> Role: Co-PI <br> Duration: 3 Years from October 2018.</li>
</li></ol> </align> </td> </tr> </tbody> </table>


<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Papers Reviewed in </font></i> </b>  </td><td><align="justify"><ol>
      <li>IEEE transaction on System, Man and Cybernetics: Part C.</li> <li>
International Journal of Network and Applications (Elsevier). </li><li>
International Journal of Applied Mathematics and Computation (Elsevier). </li><li>
	International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer). </li>
</ol>

</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%"><center>
<a href="http://www.iiita.ac.in/"> IIIT-A HOME </a></center>
</td>

<td align="center">
<img src="Venkat_IIIT_files/sword.jpg" height="120" width="120">
</td>
<td width="20%"><center><font color="blue">
<img src="Venkat_IIIT_files/bouquet.jpg" height="70" width="70">
<p>Greetings and Thanks to my Parents, Professors and Friends </p></font></center><font color="blue">
</font></td>
</tr><tr>
</tr></tbody></table>


</body></html>