| Current Path : /var/www/html/venkat/ |
| Current File : /var/www/html/venkat/index.htm |
<html><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<title>
Venkat/IIIT
</title>
</head>
<body>
<table bgcolor="lightgrey" border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center" bgcolor="white">
<img src="Venkat_IIIT_files/iiita%2520logo.jpg" height="110" width="100">
</td>
<td align="center"><b>
<font size="5">Indian Institute of Information Technology,Allahabad</font>
<br><font size="1">(An Institute of National Importance by Act of Parliament)
</font><br>
A Centre of Excellence in Information Technology, Established by Ministry Of H.R.D., Govt Of India <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
</b></td>
<td align="center" width="10%">
<img src="venk.jpg" height="200" width="250">
</td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center">
<h1><b><font color="blue"><span><span id="dtx-highlighting-item" dtx-highlight-backgroundcolor="lime"> S.VENKATESAN (In Tamil: சு.வெங்கடேசன்) </span></span></font></b> </h1></td>
</tr><tr>
</tr></tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Designation and Address </font> </i></b></td>
<td>
Associate Professor <br> Department of Information Technology <br>
Room Number : 4304 <br>
Computer Centre - 2(CC-2) <br>
Indian Institute of Information Technology, Allahabad <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
Ph. : + 91 532 2922138 <br>
E-Mail : <img src="mail1.png"> ,
<img src="mail2.png"> <br>
<b> Associated with :</b> <a href = "/venkat/nsc/"> Network Security & Cryptography (NSC) Lab </a>
</td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Education</font> </i></b><br></td><td><align="justify"><ul><li>
Ph.D. - Mobile Agent Security from Department of Computer Science and
Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010. Thesis Advisor: Prof.C.Chellappan</li><li>
M.Tech. - Computer Science and Engineering from Bharath Institute of
Higher Education and Research University,Chennai, Tamilnadu, India in
2005.</li><li>
B.Tech. - Computer Science and Engineering from Sri Manakula Vinayagar
Engineering College affiliated with Pondicherry University, Pondicherry,
India in 2003. </li><li>
DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000. </li></ul></align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b> <i><font color="lightred">Publications</font></i> </b> <br></td><td><align="justify">
<b>International Journals </b> <br> <ol><li>
Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.</li>
<!--<li> Venkatesan S., Chellappan C., Anurika Vaish, Dhavachelvan P. and Prabhu C., "A Collaborative Model to Mitigate the TCP SYN Flood Attack in IPv4/IPv6 Environment", accepted to publish in International Journal of Information and Computer Security, Inderscience Publishers.</li>--><li>
Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and
Dhavachelvan P.(2013), "Artificial Immune System based Mobile Agent Platform Protection", International Journal on Computer Standard and Interfaces,Elsevier Standards, Vol.35, No.4,pp.365-373.
</li><li>
Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and
Dhavachelvan.P (2013), " Analysis of accounting models to detect duplicate
request in Web Service", Journal of King Saud
University - Computer and Information Sciences,Elsevier Standards, Vol.25, No.1,pp.7-24.
</li><li>
Venkatesan S., Chellappan C., Vengattaraman C., Dhavachelvan P. and Anurika
Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity
and Malicious Availability Check', International Journal of Computer
and Network Applications,Elsevier Standards, Vol No.33, pp.661-671. </li><li>
Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance
analysis of mobile agent failure recovery in E-Service applications',
International Journal on Computer Standard and Interfaces, Elsevier
Standards, Vol.32,No.1-2,pp.38-43.</li><li>
Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent
(FRoMA) Protection against Multiple Attacks', International Journal on
Communication Networks and Distributed Systems, Inderscience Publishers,
Vol. 3, No. 4, pp. 362-383. </li><li>
Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of
Free-Roaming Mobile Agent in Distributed Environment',
International Journal on Computer standard and Interfaces, Elsevier
Standards, Vol. 31, No. 2, pp. 428-436. </li><li>
Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming
Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth
International Journal, Vol. 4, No. 1, pp. 14-19. </li></ol>
<b>International Conferences </b><br><ol>
<li>Venkatesan S et al. (2019), 'Simplification of Compiler Design Course Teaching using Concept Maps', Proceedings of 7th International Conference on Information Technology in Education (ICITE 2019), Sydney, Australia, pp.91-102. </li>
<li>Akansha Pandey, Ezhil S.Kalaimannan and Venkatesan.S (2015), 'An Information Diffusion Model to analyse the behavior of Online Social Network based Malwares', Proceedings of The 2015 International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, pp.867-868. </li>
<li>Preeti Yadav, Savita Gupta and Venkatesan.S (2014), 'Trust model for Privacy in Social Networking using Probablistic Determination', Proceedings of 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014),Madras Institute of Technology, Anna University, Chennai. (Best Paper Award). </li><li>
Ragini, Parul Mehrotra and Venkatesan.S (2014), 'An efficient model for Privacy and Security in Mobile Cloud Computing',Proceedings of the 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014), Madras Institute of Technology, Anna University, Chennai. </li><li>
Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic
Data Integrity protection in cloud computing', Proceedings of the
International Conference on Advances in Communication, Network, and
Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Identifying the Split
Personality of the Malicious Host in the Mobile Agent Environment',
Proceedings of the 2008 IEEE International Conference on Intelligent
Systems, Bulgaria, pp. 14-40 to 14-44.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent
Platform through Attack Identification Scanner (AIS) by Malicious
Identification Police (MIP)', Proceedings of the IEEE International
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to
Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment',
Proceedings of the ACM International Conference on Advances in Computing
(ICAC 2008), India, pp. 1-4.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free
Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of
the IEEE International Conference on Advances in Computer Vision and
Information Technology(ACVIT'07), India, pp. 16-24. </li><li>
Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming Mobile
Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of
International Conference on Mobile Multimedia
Communication(MobiMedia'07), Greece, pp. 293-297.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming
Mobile Agent against Multiple Attacks', ACM Proceedings of
International Conference on Mobile Multimedia Communication
(MobiMedia'07), Greece, pp. 275-279. </li><li>
Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered
Firewall', Proceedings of 1st International Conference on Intelligent
System and Control(ISCO'06), Coimbatore, India. </li></ol>
<b>Book Chapters </b><br><ol><li>
Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of
Ubiquitous Multimedia Content Discovery Mobile Agent', published in the
book named Ubiquitous Multimedia and Mobile Agents: Models and
Implementations, Editor: Susmit Bagchi IGI Global Publishing Service,
USA.pp.215-231.</li><li>
Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based
Multimedia Content Discovery', published in the book named Ubiquitous
Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit
Bagchi, IGI Global Publishing Service, USA. pp.135-147.</li></ol>
<b>Workshop </b><br><ol><li>
S.Venkatesan, Shubham Sahai Srivastava and Sandeep Kumar Shukla (2017), "Decentralized Authentication for IoT Devices using the Blockchain", accepted to present in the 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges, organized by ISRDC, IIT Bombay, India.</li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Invited Talks</font></i></b><br></td><td><align="justify"><ol><li>
Title: Vulnerabilities in Network Protocols<br>
TEQIP-II Sponsored National Workshop On Advanced VLSI, Signal processing and Communication network (AVSC-2014), MNNIT, Allahabad, 2014. </li>
<li>
Title: Security Vulnerabilities in the Network Protocols,Improved services and Bitcoin Technique <br>
Five Days National Workshop on Emerging Trends in Communication & Information Technology (COMMIT'17), SHUATS, Allahabad, Jan-Feb 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at Department of Computer Science and Engineering, IIT-Kanpur, 11th March 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at IEEE Computer Society of India Symposium, IIIT - Allahabad, 18th March 2017.
</li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Experience</font></i></b><br></td><td><align="justify"><ol><li>
Research: 2.2 Years in Collaborative Directed Basic research on Smart
and Secure Environment (SSE) project funded by National Technical
Research Organization (NTRO), New Delhi as Research/Scientific
Associate. </li><li>
Teaching: 12 Years. </li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Software Development</font></i> </b> <br></td><td><align="justify"><ol><li>
Digital Display Content Copying Protection for Smart and Secure
Environment project funded by National Technical Research Organization,
New Delhi </li><li>
Online Examination System for Smart and Secure Environment project
funded by National Technical Research Organization, New Delhi. </li><li>
Elective and Project Registration Portal for IIIT-Allahabad students. </li> <li>
Online Program (C, C++, Java, Python and Perl) evaluation tool. </li> </ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b> <i><font color="lightred">Courses Teaching</font></i> </b> <br></td>
<td><align="justify">
<br><b> <a href="http://profile.iiita.ac.in/venkat/course/" target = "_blank">Course Site</a>
</b> <br>
<!--<ol><li>
Compiler Design</li><li>
Network Security </li><li>
Security Architecture</li></ol>
-->
</align="justify"><br></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Interest </font></i> </b> </td><td><align="justify">
<ol><li>Mobile Agent Security </li><li>
Cryptography</li><li>
Blockchain</li><li>
Cloud Computing and Social Network Privacy</li> </ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Team </font> </i> </b></td> <td> <align="justify">
<ol> <li> Dr. Saurabh Prakash <br> PhD <br> Thesis Title: A Privacy Preserving Framework for Data Storage and Retrieval on the Cloud [Completed] </li><li> Mrs.Jaya Singh <br> Research Scholar <br> Research Area: Big Data Security </li><li> Ms.Sumouli <br> M.Tech (IS)[2015] <br> Thesis Title: Lattice based Fully Homomorphic Public Key Cryptosystem on Smaller Key [completed] </li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Professional Membership </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute of Electrical and Electronics Engineers (IEEE) </li><li> Association for Computing Machinery (ACM)</li><li> Cryptology Research Society of India (CRSI) </li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Project </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute one time seed money <br> Electronic Medical Record Management System using Blockchain Technology <br> Cost: Approximate Rs.10 lakhs <br> Role: Principal Investigator <br> Duration : 1 year [From May 2017] </li>
<li> Department of Science & Technology - ICPS <br>Development of Secure IoT Communication using the Blockchain Technologyr <br> Recommended Cost: ~Rs.36 lakhs <br> Role: Principal Investigator <br> Duration: 3 years August 2019</li> Department of Science & Technology - Indo-Norway Collobarative Project <br> Cyber-Physical Security in Energy Infrastructure of Smart Cities (CPSEC) <br> Recommended Cost: Approximate Rs.36 lakhs <br> Role: Co-PI <br> Duration: 3 Years from October 2018.</li>
</li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Papers Reviewed in </font></i> </b> </td><td><align="justify"><ol>
<li>IEEE transaction on System, Man and Cybernetics: Part C.</li> <li>
International Journal of Network and Applications (Elsevier). </li><li>
International Journal of Applied Mathematics and Computation (Elsevier). </li><li>
International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer). </li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%"><center>
<a href="http://www.iiita.ac.in/"> IIIT-A HOME </a></center>
</td>
<td align="center">
<img src="Venkat_IIIT_files/sword.jpg" height="120" width="120">
</td>
<td width="20%"><center><font color="blue">
<img src="Venkat_IIIT_files/bouquet.jpg" height="70" width="70">
<p>Greetings and Thanks to my Parents, Professors and Friends </p></font></center><font color="blue">
</font></td>
</tr><tr>
</tr></tbody></table>
</body></html>