COURSES HANDLED
Sl No Year Stream Sem Branch Subject
1 2024 B.Tech. S6 CS-C NETWORKING LAB
2 2024 B.Tech. S4 CS-B COMPUTER ORGANIZATION AND ARCHITECTURE
3 2024 B.Tech. S2 CS-A LOGIC SYSTEM DESIGN
4 2024 B.Tech. S2 CS-A LOGIC SYSTEM DESIGN LAB
5 2023 B.Tech. S7 CS-A SEMINAR
6 2023 B.Tech. S5 CS-C MICROPROCESSORS AND MICROCONTROLLERS
7 2023 B.Tech. S5 CS-C DATABASE MANAGEMENT SYSTEMS LAB
8 2023 B.Tech. S5 CS-A DATABASE MANAGEMENT SYSTEMS LAB
9 2023 B.Tech. S4 CS-A ANDROID PROGRAMMING
10 2023 B.Tech. S3 CS-C DESIGN AND ENGINEERING
11 2023 B.Tech. S2 EC-C PROGRAMMING IN C
12 2022 B.Tech. S8 CS-C DATA SCIENCE
13 2022 B.Tech. S8 CS-B DATA SCIENCE
14 2022 B.Tech. S8 CS-A DATA SCIENCE
15 2022 B.Tech. S6 CS-A NETWORKING LAB
16 2022 B.Tech. S5 CS-C DATABASE MANAGEMENT SYSTEMS LAB
17 2022 B.Tech. S5 CS-B MANAGEMENT OF SOFTWARE SYSTEMS
18 2022 B.Tech. S5 CS-B DATABASE MANAGEMENT SYSTEMS LAB
19 2022 B.Tech. S5 CS-A MANAGEMENT OF SOFTWARE SYSTEMS
20 2022 B.Tech. S5 CS-A DATABASE MANAGEMENT SYSTEMS LAB
21 2022 B.Tech. S2 ME-A PROGRAMMING IN C
22 2021 B.Tech. S7 CS-C DISTRIBUTED COMPUTING
23 2021 B.Tech. S7 CS-B PROGRAMMING PARADIGMS
24 2021 B.Tech. S5 CS-C DATABASE MANAGEMENT SYSTEMS LAB
25 2021 B.Tech. S5 CS-A DATABASE MANAGEMENT SYSTEMS LAB
PUBLICATION-CONFERENCE/JOURNAL DETAILS
Year Title of the Paper-Conference/Journal Details
2022 Astrengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
Information and Computation, Elsevier
2021 A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks
Journal of Integrated Design and Process Science
2021 Comorbidity Based Risk Prediction System for ARDS in COVID-19 Patients
International Conference on Advanced Computer Control, ICACC
2020 An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries
Information and Computation, Elsevier
2019 An Efficient eCK Secure Certificateless Authenticated Key Agreement Scheme with Security Against Public Key Replacement Attacks
Journal of information security and applications
2018 An Efficient Forward Secure Authenticated Encryption Scheme with Ciphertext Authentication Based on Two Hard Problems
Advances in Big Data and Cloud Computing
2018 A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
Journal of King Saud University-Computer and Information Sciences
2017 Analysis of hierarchical identity based encryption schemes and its applicability to computing environments
Journal of information security and applications
2016 Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games
International Conference on Advances in Computing and Communications
2013 A Trusted Integrity Verification Architecture for Commodity Computers
International Journal of Computer Applications Technology and Research
2013 Launch Time Application Security: The Trusted Approach
International Journal of Science and Research
2013 Towards a Trust Envisioned Cyber Security
International Journal of Innovation and Applied Studies
PUBLICATION-BOOKS
Year Date of Publication Title of the Book Published By Edition
2019 17-Mar-2020 The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems Academic Press, Elsevier 9780128163856