Title | Dr. | First Name | OM | Last Name | PAL | ||
---|---|---|---|---|---|---|---|
Designation | Associate Professor | ||||||
Department | Department of Computer Science | ||||||
office@cs.du.ac.in | |||||||
Webpage | |||||||
Phone.no | 01127667591 |
Employement Info | |||||||
---|---|---|---|---|---|---|---|
Employee Type | Nature Of Employment | ||||||
Teaching | Permanent |
Educational | |||||||
---|---|---|---|---|---|---|---|
Degree/Certification | Institution | Year | |||||
Ph.D. - Study of Cryptographic Key Management in perspective of Cyber Security | Jamia Millia Islamia | 2019 | |||||
PG | IIT Bombay | 2015 | |||||
PG | IGNOU | 2009 | |||||
UG | Dr B R Ambedkar University Agra | 2002 | |||||
HSC | UP Board | 1998 | |||||
SSC | UP Board | 1996 |
Qualifications | |||||||
---|---|---|---|---|---|---|---|
Examination Name | Conducted By | Date of Passing | |||||
NET | UGC | 2015-06-15 |
Teaching experience outside the Institution | |||||||
---|---|---|---|---|---|---|---|
Designation | Institution | Duration From | Duration To | ||||
Scientist 'C' | Ministry of Electronics and Information Technology (MeitY), Govt of India | 2014-05-21 | 2019-12-31 | ||||
Project Engineer | Centre for Development of Advanced Computing (C-DAC) | 2006-03-24 | 2007-09-30 | ||||
Staff Scientist | C-DAC | 2007-10-01 | 2011-07-29 | ||||
Sr Project Engineer/Sr Technical Officer | C-DAC | 2011-08-01 | 2014-05-20 | ||||
IT Resource Person | National Thermal Power Corporation (NTPC) Ltd | 2005-05-30 | 2006-03-15 | ||||
Scientist 'D' | Ministry of Electronics and Information Technology (MeitY), Govt of India | 2020-01-01 | 2023-05-16 |
Research Publications | |||||||
---|---|---|---|---|---|---|---|
Article Name | Publication Type | Journal Name | ISSN No | Volume | Year | URL | DOI |
SCGKM: A secure and cost effective group key management scheme for multicast communication in large dynamic groups | Research Papers in Scopus Listed Journals | International Journal of Information Technology | 2511-2104 | 14 | 2022 | https://www.springer.com/journal/41870 | 10.1007/s41870-021-00827-3 |
EETSP: "Energy Efficient Two Stage Routing Protocol for Wireless Sensor Network Assisted Internet of Things | Research Papers in Web of Science Listed Journals | International Journal of Communication Systems | 1074-5351 | 34 | 2021 | https://onlinelibrary.wiley.com/journal/10991131 | 10.1002/DAC.4965 |
Efficient and Secure Key Management for Conditional Access Systems | Research Papers in Web of Science Listed Journals | IEEE Transactions on Consumer Electronics | 00983063 | 66 | 2020 | https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=30 | 10.1109/TCE.2019.2959629 |
Efficient and secure conditional access system for pay-TV systems | Research Papers in Web of Science Listed Journals | Multimedia Tools and Applications | 1380-7501 | 78 | 2019 | https://www.springer.com/journal/11042 | 10.1007/S11042-019-7257-5 |
Key Management for Blockchain Technology | Research Papers in Web of Science Listed Journals | ICT Express journal | 2405-9595 | 7 | 2021 | https://www.sciencedirect.com/journal/ict-express | 10.1016/J.ICTE.2019.08.002 |
Dual secure robust watermarking scheme based on hybrid optimization algorithm for image security | Research Papers in Web of Science Listed Journals | Personal and Ubiquitous Computing | 1617-4909 | 2021 | https://www.springer.com/journal/779 | 10.1007/S00779-021-01597-2 | |
FD YOLOv5 Fuzzy image enhancement based robust deep neural model for safety helmet detection | Research Papers in Web of Science Listed Journals | International Journal of Fuzzy Systems, | 1562-2479 | 24 | 2022 | https://www.springer.com/journal/40815 | 10.1007/S40815-022-01267-2 |
Real-world model for bitcoin price prediction | Research Papers in Web of Science Listed Journals | Information Processing and Management | 0306-4573 | 59 | 2022 | https://www.sciencedirect.com/journal/information-processing-and-management | 10.1016/J.IPM.2022.102968 |
An ensemble-based feature selection framework for early detection of Parkinson's disease based on feature correlation analysis | Research Papers in Web of Science Listed Journals | Mathematical Methods in the Applied Sciences | 1099-1476 | 2022 | https://onlinelibrary.wiley.com/journal/10991476 | 10.1002/mma.7835 | |
Analysing the impact of COVID-19 pandemic on the psychological health of people using fuzzy MCDM methods | Research Papers in Web of Science Listed Journals | Operations Research Perspectives | 2214-7160 | 10 | 2023 | https://www.sciencedirect.com/journal/operations-research-perspectives | 10.1016/j.orp.2022.100263 |
A New Blockchain and Fog Computing Model for Blood Pressure Medical Sensor Data Storage | Research Papers in Web of Science Listed Journals | Computers and Electrical Engineering | 1879-0755 | 102 | 2022 | https://www.sciencedirect.com/journal/computers-and-electrical-engineering | 10.1016/j.compeleceng.2022.108202 |
Blockchain Technology and It’s Applications in E-Governance Services | Research Papers in Scopus Listed Journals | International Journal of Recent Technology and Engineering | 2277-3878 | 8 | 2022 | https://www.ijrte.org/ | 10.35940/ijrte.D8599.118419 |
Publications other than journal articles | |||||||
---|---|---|---|---|---|---|---|
Title of Publication | Type of Publication | Publisher | Role in Publication | ISBN Number | Year | URL | Level |
Cyber Security Using Modern Technologies | Edited/Translated Books | Taylor & Francis Group | Editor | 9781003267812 | 2023 | https://www.taylorfrancis.com/books/edit/10.1201/9781003267812/cyber-security-using-modern-technologies-om-pal-vinod-kumar-rijwan-khan-bashir-alam-mansaf-alam | International |
Evolution of Machine Translation for Indian Regional Languages using Artificial Intelligence | Full Paper in Conference Proceedings/Other | IEEE | Co-Author | 2023 | https://ieeexplore.ieee.org/document/10150776 | International | |
Quantum Computing: A Global Scenario | Chapters in Books | Taylor & Francis | Author | 9781032213194 | 2023 | https://www.taylorfrancis.com/chapters/edit/10.1201/9781003267812-1/quantum-computing-om-pal-vinod-kumar-vinay-thakur-bashir-alam?context=ubx&refId=ff628495-8bc2-4e57-948c-59b4583d1da5 | International |
Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments | Chapters in Books | Taylor & Francis | Co-Author | 9781032213194 | 2023 | https://www.taylorfrancis.com/chapters/edit/10.1201/9781003267812-6/computation-storage-efficient-key-distribution-protocol-secure-multicast-communication-centralized-environments-vinod-kumar-khushboo-gupta-om-pal-rajendra-kumar-pradeep-kumar-tiwari-narendra-kumar-updhyay-mukesh-kumar-bhardwaj?context=ubx&refId=b7d58c95-1af2-4517-b7db-1379e6f6c2a0 | International |
Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography | Chapters in Books | Taylor & Francis | Co-Author | 9781032213194 | 2023 | https://www.taylorfrancis.com/chapters/edit/10.1201/9781003267812-7/effective-key-agreement-protocol-large-dynamic-groups-using-elliptic-curve-cryptography-vinod-kumar-khushboo-gupta-om-pal-shiv-prakash-pravin-kumar-shiv-veer-singh-pradeep-kumar-tiwari-animesh-tripathi?context=ubx&refId=5caae966-4f65-475b-90e2-c9bfa7645923 | International |
Evaluation of AI Algorithms used for Non-Masked and Masked Face Recognition | Full Paper in Conference Proceedings/Other | IEEE | Co-Author | 2023 | https://ieeexplore.ieee.org/document/10183231 | International | |
Investigating Classification with Quantum Computer | Full Paper in Conference Proceedings/Other | Taylor & Francis | Co-Author | 9781032442785 | 2023 | https://www.routledge.com/Intelligent-Data-Analytics-IoT-and-Blockchain/Alam-Alam/p/book/9781032442785 | International |
Unleashing the Potentials of Blockchain Technology for Healthcare Industries | Edited/Translated Books | Elsevier | Editor | 9780323994811 | 2023 | https://www.sciencedirect.com/book/9780323994811/unleashing-the-potentials-of-blockchain-technology-for-healthcare-industries | International |
A study on Evolution of Facial Recognition Technology | Full Paper in Conference Proceedings/Other | IEEE | Co-Author | 2023 | https://ieeexplore.ieee.org/abstract/document/10150876/authors#authors | International | |
Neural Machine Translation and detailed analysis of impact of pre-processing techniques for Indian regional languages | Full Paper in Conference Proceedings/Other | IEEE | Co-Author | 2023 | https://ieeexplore.ieee.org/document/10183148 | International | |
Quantum and Post Quantum Cryptography | Chapters in Books | Wiley | Author | 978-1-119-79563-6 | 2022 | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667 | International |
Blockchain Network: Performance Optimization | Full Paper in Conference Proceedings/Other | Springer | Author | 978-981-19-4831-2 | 2022 | https://link.springer.com/chapter/10.1007/978-981-19-4831-2_55 | International |
Key Management Scheme for Secure Group Communication | Full Paper in Conference Proceedings/Other | Springer | Author | 978-981-15-0694-9 | 2020 | https://link.springer.com/chapter/10.1007/978-981-15-0694-9_17 | International |
Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems | Full Paper in Conference Proceedings/Other | Springer | Author | 978-3-030-30577-2 | 2019 | https://link.springer.com/chapter/10.1007/978-3-030-30577-2_91 | International |
A Homomorphic Encryption Scheme Over Integers Based on Carmichael’s Theorem | Full Paper in Conference Proceedings/Other | IEEE | Co-Author | 2017 | https://ieeexplore.ieee.org/document/7955178 | International | |
Secure Identity-Based Key Establishment Protocol | Full Paper in Conference Proceedings/Other | Springer | Author | 978-3-642-19541-9 | 2011 | https://link.springer.com/chapter/10.1007/978-3-642-19542-6_121 | International |
Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography | Full Paper in Conference Proceedings/Other | Springer | Author | 978-3-642-19542-6 | 2011 | https://link.springer.com/chapter/10.1007/978-3-642-19542-6_96 | International |
Public Key Cryptography Based Approach for Securing SCADA Communications | Full Paper in Conference Proceedings/Other | Springer | Co-Author | 978-3-642-19542-6 | 2011 | https://link.springer.com/chapter/10.1007/978-3-642-19542-6_10 | International |
Cryptographic Key Management for SCADA System: An Architectural Framework | Full Paper in Conference Proceedings/Other | IEEE | Author | 2010 | https://ieeexplore.ieee.org/document/5376776 | International |
Patents | |||||||
---|---|---|---|---|---|---|---|
Patent Title | Outcome of the Patent | Patent Number | Level of Patent | ||||
METHOD AND SYSTEM FOR SECURE GROUP COMMUNICATION FORDYNAMIC GROUP | 514965 | National | |||||
Centralized Digital System for Ppv and Ppc Multimedia Services for Conditional Access System | 515115 | National |