« Go Back

Dr. Renu Mary Daniel
Ph.D. Computer Science and Engineering, M. Tech Computer Science and Engineering
Asst Professor

Dr.Renu Mary Daniel received her B.E. degree in Computer Science and Engineering from Anna University (ninth rank),in 2011and M. Tech. degree in Computer Science and Engineering from Karunya University (first rank),in 2013.From 2015-19, she did her full-time Ph.D. in Computer Science and Engineering with fellowship under the Visvesvaraya Ph.D. Scheme for Electronics and IT, sponsored by the Ministry of Electronics and Information Technology (MeitY), Government of India. 

Her areas of interest include design and cryptanalysis of elliptic and conic curve cryptosystems. She has published several Scopus and SCIE indexed journal articles, conference papers and book chapters. She is also a reviewer in international journals like IEEE Access, Frontiers of Computer Science and Transactions on Emerging Telecommunication Technologies.

She joined Rajagiri School of Engineering & Technology, as Assistant professor in the Department of Computer Science and Engineering on 1stJanuary, 2020.

RSET Unique Id: 31913
Area of Interest: Cryptography, Number Theory
Email renumd@rajagiritech.edu.in
Year Title of the Paper-Conference/Journal Details
2022 Astrengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
Information and Computation, Elsevier
2021 A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks
Journal of Integrated Design and Process Science
2021 Comorbidity Based Risk Prediction System for ARDS in COVID-19 Patients
International Conference on Advanced Computer Control, ICACC
2020 An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries
Information and Computation, Elsevier
2019 An Efficient eCK Secure Certificateless Authenticated Key Agreement Scheme with Security Against Public Key Replacement Attacks
Journal of information security and applications
2018 An Efficient Forward Secure Authenticated Encryption Scheme with Ciphertext Authentication Based on Two Hard Problems
Advances in Big Data and Cloud Computing
2018 A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
Journal of King Saud University-Computer and Information Sciences
2017 Analysis of hierarchical identity based encryption schemes and its applicability to computing environments
Journal of information security and applications
2016 Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games
International Conference on Advances in Computing and Communications
2013 A Trusted Integrity Verification Architecture for Commodity Computers
International Journal of Computer Applications Technology and Research
2013 Launch Time Application Security: The Trusted Approach
International Journal of Science and Research
2013 Towards a Trust Envisioned Cyber Security
International Journal of Innovation and Applied Studies
Year Date of Publication Title of the Book Published By Edition
2019 17-Mar-2020 The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems Academic Press, Elsevier 9780128163856