Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
214 views19 pages

Dr. Manik Lal Das: Career

This document provides a summary of Dr. Manik Lal Das's credentials and professional experience. It includes the following key details: - Dr. Das has over 22 years of experience in teaching, research, and industry. He holds a Ph.D. in Computer Science from IIT Bombay and has published over 125 research papers. - His research focuses on security, privacy, cyber security, and algorithms. He has managed several funded projects from the Government of India and collaborated with universities internationally. - He currently works as a Professor at DA-IICT Gandhinagar, where he has held various administrative and teaching positions over his career. He also works as a visiting faculty at other universities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
214 views19 pages

Dr. Manik Lal Das: Career

This document provides a summary of Dr. Manik Lal Das's credentials and professional experience. It includes the following key details: - Dr. Das has over 22 years of experience in teaching, research, and industry. He holds a Ph.D. in Computer Science from IIT Bombay and has published over 125 research papers. - His research focuses on security, privacy, cyber security, and algorithms. He has managed several funded projects from the Government of India and collaborated with universities internationally. - He currently works as a Professor at DA-IICT Gandhinagar, where he has held various administrative and teaching positions over his career. He also works as a visiting faculty at other universities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Professor

Office: 2103, Faculty Block 2


DA-IICT, Gandhinagar
Gujarat-382007, INDIA.
Email: [email protected]
Homepage: http://intranet.daiict.ac.in/~maniklal_das/
Research Group page: http://security.daiict.ac.in/

Dr. Manik Lal Das


Educational Ph. D. (Computer Science), IIT Bombay, India.
Credentials M. Tech. (Computer Science), IIT Dhanbad (ISM), India.
M. Sc. (Applied Mathematics), Vidyasagar University, India.
Visiting Scholar, Western Kentucky University, USA

Career  Teaching/research/industrial experience: 22 years.


Summary
 Broad area of Teaching/Research: Computer Science.

 Research Area: Security & Privacy, Cyber Security, Algorithms.

 Funded projects managed: Sponsored projects funded by DST, DeitY, Govt.


of India; International projects – Indo-French, Indo-Spain, and Indo-Japan
bilateral collaborative scientific programme.

 Research publications (H-index: 20; Citations: 2350+; ORCID: 0000-0002-


1218-4041; ResearcherID: Q-3767-2018): Published over 125+ research
papers in refereed journals and peer-reviewed conference proceedings.

 Research guidance: 5 PhD and 30+ Master theses supervised; 75+


undergraduate projects and 100+ interns worked under my supervision.

 Editorial Board: IEEE Transactions on Dependable and Secure Computing

 Chair / Technical Program committee member / Speaker / Reviewer /


Organizer for many International and National forums.

 Research collaborators: with many foreign universities including University


of Clermont, France; University of Malaga, Spain; University of Oxford,
UK; University of Tokyo, Japan; University of Memphis, USA; and with
many premier institutions in India.

 Held positions for several administrative responsibilities including


Convenor of Board of Studies; Convenor of Undergraduate and
Postgraduate Programmes; Convenor of Admissions Committee; Member
of Faculty Selection Committee; Convenor of Curriculum Development
Committee; Member of Research Progress and Accreditation Committee.

1
Personal Date of Birth : February 19, 1970
Particulars Nationality : Indian
Gender : Male

Research Security & Privacy


Interest Cyber Security
Cryptographic primitives and Security Protocols

Senior Member of IEEE


Honors and Life Member of Cryptology Research Society of India
Awards Chair, IEEE Computer Society Chapter, Gujarat Section
Chair, IEEE Gujarat Section
Gold medalist in M.Sc. (Applied Mathematics).

Professor (September 2016 – present)


Professional DA-IICT, Gandhinagar, India
Experience Associate Professor (April 2012 – August 2016)
DA-IICT, Gandhinagar, India

Assistant Professor (July 2006 – March 2012)


Dhirubhai Ambani Institute of Information and Communication Technology
(DA-IICT), Gandhinagar, India

Postdoctoral Researcher (July 2007 – June 2008)


Western Kentucky University, USA

Research Officer (August 2001 - July 2006)


Institute for Development and Research in Banking Technology (IDRBT)
Hyderabad, India

Lecturer (October 1998 – July 2001)


Vidyasagar University & Haldia Institute of Technology
West Bengal, India

Visiting Faculty (2014 - )


Indian Institute of Information Technology, Vadodara
Gandhinagar, India

2
Project title: Study of Privacy, Accountability and Ownership in IoT
Funded Funded by Department of Science and Technology, Govt. of India (CEFIPRA)
under Indo-French Collaborative Research Programme under DST-INRIA-
Projects CNRS Targeted Programme.
Term: 2016-2019
Investigators: Manik Lal Das (PI) and A. Mathuria (Co-PI), India
Investigators: Lafourcade Pascal (PI) and Gerard Chalhoub (Co-PI), University
of Clermont Auvergne, France

Project title: Enabling Technologies for Remote Health Monitoring


Funded by: Gujarat Council on Science and Technology, Govt. of Gujarat.
Term: 2014-2015
Investigators: Biswajit Mishra (PI) and Manik Lal Das (co-PI)

Project title: Security and Privacy Infrastructure for Internet Of Things


scenarios and applications.
Funded by Department of Science and Technology, Govt. of India under Indo-
Spanish joint Programme of cooperation in Science and Technology.
Term: 2012-2015
Investigators: Manik Lal Das (PI) and A. Mathuria (Co-PI), India
Investigators: J. Lopez (PI) and R. Roman (Co-PI), University of Malaga,
Spain

Project title: Security proofs and multidisciplinary evaluation for dynamic


hierarchical key assignment schemes
Funded by Department of Science and Technology, Govt. of India under Indo-
Japan cooperative Programme.
Term: 2011-2014
Investigators: A. Mathuria (PI) and Manik Lal Das (Co-PI), India
Investigators: K. Matsuura (PI) and T. Hosoi (Co-PI), University of Tokyo,
Japan

Project title: Mobile Payment Systems


Funded by Ministry of Comm. and Information Technology, Govt. of India.
Term: 2002-2005
Investigators: D. B. Phatak, A. Saxena, V. P. Gulati and Manik Lal Das

Project title: Multi-application Smart card based Payment Systems


Funded by Ministry of Comm. and Information Technology, Govt. of India
Term: 2001-2004
Investigators: D. B. Phatak, V. P. Gulati, A. Saxena, and Manik Lal Das

3
Book Chapters
 Natalia Miloslavskaya, Alexander Tolstoy, Vladimir Budzko, Manik Lal
Research Das. Blockchain Application for IoT Security Management. Essentials of
Blockchain Technology, CRC Press/Taylor&Francis, 2019.
Publications
 Manik Lal Das, Hardik Gajera, and Viral Shah. Blockchain-powered
Healthcare Insurance System. Security and Privacy of Electronic
Healthcare Records Concepts, Paradigms and Solutions, The Institution of
Engineering and Technology (IET), 2019.

 Manik Lal Das. Privacy and Accountability Concerns in the Age of Big
Data. Big Data: Storage, Sharing, and Security, CRC Press, 2016.
 Rachit Mittal, Sarita Agrawal, and Manik Lal Das. Secure Node
Localization in Clustered Sensor Networks with Effective Key Revocation.
Emerging Innovations in Wireless Networks and Broadband Technologies,
12-41, 2016.
 Manik Lal Das and Siva C Muraharirao. Digital Image Protection using
Keyed Hash Function. Computer Vision and Image Processing in Intelligent
Systems and Multimedia Technologies, 203-215, 2014.
 Shefali Jain, Anish Mathuria, and Manik Lal Das. Misbehavior Detection
in VANET: A Survey. Security, Privacy, Trust, and Resource Management
in Mobile and Wireless Communications, 134-147, 2014.
 Manik Lal Das and Aakash Joshi. Dynamic Program Update in Wireless
Sensor Networks. Security in Ad-hoc and Sensor Networks, World Scientific
Publisher, 369-384, 2009.
 V. L. Narasimhan and Manik Lal Das. Security Requires Information
Literacy: A Perspective on Information Security for Business, Human,
Social and Systemic Security. Issues in Information and Media Literacy:
Education, Practice and Pedagogy, Informing Science Press, 257-286,
2009.

Refereed Journals
 Payal Chaudhari and Manik Lal Das. KeySea: Keyword-based Search with
Receiver Anonymity in Attribute-based Searchable Encryption. IEEE
Transactions on Services Computing, 2020.

 Manik Lal Das, Pardeep Kumar and Andrew Martin. Secure and privacy-
preserving RFID Authentication Scheme for Internet of Things
Applications. Wireless Personal Communications, 110(1):339-353, 2019.
 Payal Chaudhari and Manik Lal Das. Privacy Preserving Searchable
Encryption with Fine-grained Access Control. IEEE Transactions on Cloud
Computing, 2019.
 Dhwani Patel and Manik Lal Das. TIDE: tampered image detection using
mutual information. International Journal of Multimedia Intelligence and
Security, Inderscience, 2019.

4
 Sarita Agrawal, Manik Lal Das, and Javier Lopez. Detection of Node
Capture Attack in Wireless Sensor Networks. IEEE Systems Journal,
13(1):238-247, 2018.
 Ainish Dave, Hardik Gajera, and Manik Lal Das. Privacy-preserving
Targeted Online Advertising. International Journal of Social Computing
and Cyber-Physical Systems, Inderscience, 2(2):132-145, 2018.
 Rahul Saranjame and Manik Lal Das. Securing Digital Image from
Malicious Insider Attacks. International Journal of Computer Vision and
Image Processing, 8(2):49-58, 2018.
 Sarita Agrawal and Manik Lal Das. Mutual Healing enabled Group-key
Distribution Protocol in Wireless Sensor Networks. Computer
Communications, Elsevier, 112:131-140, 2017.
 Subhas Chandra Sahana, Bubu Bhuyan, and Manik Lal Das. An Efficient
Key Escrow-Free Identity-Based Signature Scheme. International Journal
of Applied Engineering Research, 12(19):8964-8971, 2017.
 Manik Lal Das. Key-escrow free Multi-signature Scheme using Bilinear
Pairings. Groups Complexity & Cryptology, 7(1):47-57, 2015.
 Jaydeep Solanki, Aenik Shah, Manik Lal Das. Secure Patrol: Patrolling
against buffer overflow exploits. Information Security Journal: A Global
Perspective, 23(3):107-117, 2014.
 Anand Mudgerikar and Manik Lal Das. Secure Multicast using IPsec and
Multi-party Key Computation. International Journal of Internet Technology
and Secured Transactions, Inderscience, 5(2):149-162, 2014.
 Manik Lal Das and Navkar Samdaria. On the Security of SSL/TLS-enabled
Applications. Applied Computing and Informatics, Elsevier, 10:68-81, 2014.
 Rachit Mittal and Manik Lal Das. Secure Node Localization in Mobile
Sensor Networks. International Journal of Wireless Networks and
Broadband Technologies, 3(1):18-33, 2014.
 Chandrapal Chahar, Vishal S Chauhan and Manik Lal Das. Code Analysis
for Software and System Security using Open Source Tools. Information
Security Journal: A Global Perspective, Taylor & Francis, 21(6):346-352,
2012.
 Siva C Muraharirao and Manik Lal Das. Digital Image Protection using
Keyed Hash Function. International Journal of Computer Vision and Image
Processing, 2(2):36-47, 2012.
 Anshul Singhal and Manik Lal Das. MPEG Video Security using Motion
Vectors and Quadtrees. Journal of Mobile, Embedded and Distributed
Systems, 4(3):203-208, 2012.
 Anil Mundra, Anish Mathuria and Manik Lal Das. Detecting flaws in
dynamic hierarchical key management schemes using specification
animation. CSI Journal of Computing, 1(2):73-80, 2012.
 Manik Lal Das. A Key Escrow-free Identity-based Signature Scheme
without using Secure Channel. Cryptologia, 35(1):58-72, 2011.
 Manik Lal Das. Two-factor user authentication in wireless sensor
networks. IEEE Transactions on Wireless Communications, 8(3):1086-
1090, 2009.
5
 P. B. Reddy and Manik Lal Das. An Improved and Efficient Micro-
payment Scheme. Journal of Theoretical and Applied Electronic Commerce
Research, 4(1):91-100, 2009.
 V. L. Narasimhan, P. T. Parthasarathy, and Manik Lal Das. Evaluation of a
Suite of Metrics for Component Based Software Engineering. Issues in
Informing Science and Information Technology, 6:731-740, 2009.
 Manik Lal Das, Ashutosh Saxena, and Deepak B Phatak. Algorithms and
Approches of Proxy Signatures: A Survey. International Journal of Network
Security, 9(3):264-284, 2009.
 G. Thulasi, Manik Lal Das, and Ashutosh Saxena. An Improved Bilinear
Pairing based Remote User Authentication Scheme. Computer Standards &
Interfaces, Elsevier, 31:181-185, 2009.
 V. L. Narasimhan and Manik Lal Das. DIS: Data and Information
Security for BS and MS Program – A Proposal. ACM SIGCSE, 40(4):95-99,
2008.
 Manik Lal Das and Aaksh Joshi. Dynamic Program Update in Wireless
Sensor Networks Using Orthogonality Principle. IEEE Communications
Letters, 12(6):471-473, 2008.
 Vidhani Kumar and Manik Lal Das. Securing Wireless Sensor Networks
with Public Key Techniques. Adhoc & Sensor Wireless Networks, 5:189-
201, 2008.
 Manik Lal Das. Comments on “Improved Efficient Remote User
Authentication Schemes”. International Journal of Network Security,
6(3):282-284, 2008.
 Manik Lal Das, Ashutosh Saxena, and Deepak B Phatak. Proxy Signature
Scheme with Effective Revocation using Bilinear Pairings. International
Journal of Network Security, 4(3):312-317, 2007.
 G. Raju, G. M. Choudary, Manik Lal Das, and Ashutosh Saxena.
Threshold Key Issuing in Identity Based Cryptosystems. Computer
Standards & Interfaces, Elsevier, 29(2):260-264, 2007.
 G. Raju, G. M. Choudary, Manik Lal Das, and Ashutosh Saxena. Identity
based Multisignatures. INFORMATICA, 17(2):177-186, 2006.
 Manik Lal Das. A Flexible and Secure Remote Systems Authentication
Scheme Using Smart Cards. Transaction on Electronics, Computer and
Communication, 1(2):78-82, 2006.
 Manik Lal Das, Ashutosh Saxena, V. P. Gulati, and Deepak B Phatak. A
Novel Remote User Authentication Scheme using Bilinear Pairings.
Computers & Security, Elsevier, 25(3):184-189, 2006.
 Manik Lal Das, Ashutosh Saxena, V. P. Gulati, and Deepak B Phatak.
Hierarchical Key Management Scheme Using Polynomial Interpolation.
ACM System Interest Group Operating Systems Review, 39(1):40-47, 2005.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. An Efficient Proxy
Signature Scheme with Revocation. INFORMATICA, 15(4):455-464, 2004.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. A Dynamic ID-based
Remote User Authentication Scheme. IEEE Transactions on Consumer
Electronics, 50(2):629-631, 2004.
6
Peer-reviewed Conferences
 Hardik Gajera and Manik Lal Das. DeDOP: Deduplication with cross-
server ownership over encrypted data. In Proc. of ISEA Asia Security &
Privacy Conference (ISEA Asia S&P 2020), IEEE, Guwahati, India, 2020.

 Hardik Gajera and Manik Lal Das. PriVC: Privacy Preserving Verifiable
Computation. In Proc. of the International Conference on Communication,
Systems & Networks (COMSNETS 2020), IEEE, Bangalore, India, 2020.

 Kirtan Patel and Manik Lal Das. Transcript Management Using Blockchain
Enabled Smart Contracts. In Proc. of International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2020), LNCS
11969, Springer, pp. 392-407, Bhubaneswar, India, 2020.

 Nidhi Gupta, Manik Lal Das, and Sukumar Nandi. LandLedger:


Blockchain-powered Land Property Administration System. In Proc. of the
IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS 2019), IEEE, India, 2019.
 Ruchi Kachhia, Prachi Agrawal and Manik Lal Das. Tag-Reader
Authentication System Guarded by Negative Identifier Filtering and
Distance Bounding. In Proc. of International Conference on Distributed
Computing and Internet Technologies (ICDCIT 2019), LNCS 11319,
Springer, pp. 339-348, Bhubaneswar, India, 2019.
 Jinita Patel, Manik Lal Das, and Sukumar Nandi. On the Security of
Remote Key Less Entry for Vehicle. In Proc. of the IEEE International
Conference on Advanced Networks and Telecommunications Systems
(ANTS 2018), IEEE, India, 2018.
 Hardik Gajera, Shruti Naik, and Manik Lal Das. MedCop: Verifiable
Computation for Mobile Healthcare System. In Proc. of International
Symposium on Security in Computing and Communications, Bangalore,
India, 2018.

 K. Hemantha, Nidhi Desai, and Manik Lal Das. On Minimality Attack for
Privacy-Preserving Data Publishing. In Proc. of International Symposium
on Security in Computing and Communications, Bangalore, India, 2018.

 Vishal Maral, Nachiket Trivedi, and Manik Lal Das. Auditing Access to
Private Data on Android Platform. In Proc. of International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2018), LNCS
10722, Springer, pp. 105-111, India, 2018.
 Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gerault, Matthieu
Giraud, and Pascal Lafourcade. Private Polynomial Evaluation. In Proc. of
International Conference on Provable Security (ProvSec 2017), LNCS
10592, Springer, pp. 487-506, China, 2017.
 Payal Chaudhari, Manik Lal Das, and Dipankar Dasgupta. Privacy-
Preserving Proxy Re-encryption with Fine-grained Access Control. In Proc.
of the International Conference on Information Systems Security (ICISS
2017), LNCS 10717, Springer, pp. 88-103, India, 2017 (Best Paper).

7
 Nachiket Trivedi and Manik Lal Das. MalDetec: A Non-Root Approach
for Dynamic Malware Detection in Android. In Proc. of the International
Conference on Information Systems Security (ICISS 2017), LNCS 10717,
Springer, pp. 231-240, India, 2017.
 Nandan Parikh and Manik Lal Das. Privacy-preserving Services in
VANET with Misbehavior Detection. In Proc. of the IEEE International
Conference on Advanced Networks and Telecommunications Systems
(ANTS 2017), IEEE, India, 2017.
 Komal Falodiya and Manik Lal Das. Security Vulnerability Analysis using
Ontology-based Attack Graphs. In Proc. of the IEEE India Council
International Conference (INDICON 2017), IEEE, India, 2017.
 Pradip Tilala, Anil Roy and Manik Lal Das. Home Access Control through
a Smart Digital Locking-Unlocking System. In Proc. of the IEEE Region 10
Conference (TENCON 2017), IEEE, Singapore, 2017.
 Payal Chaudhari and Manik Lal Das. A2BSE: Anonymous Attribute Based
Searchable Encryption. In Proc. of ISEA Asia Security & Privacy
Conference (ISEA Asia S&P 2017), India, 2017.
 Ritu Sharma and Manik Lal Das. On the Verification of Conjunctive
Keyword Search Results using Authenticated Crawlers. In Proc. of the
International Conference on Communication, Systems & Networks
(COMSNETS 2017), IEEE, India, 2017.
 Payal Chaudhari and Manik Lal Das. On the Security of a Searchable
Anonymous Attribute Based Encryption. In Proc. of International
Conference on Mathematics and Computing (ICMC 2017), India, 2017.
 Payal Chaudhari and Manik Lal Das. Privacy Preserving Signcryption
Scheme. In Proc. of International Conference on Distributed Computing
and Internet Technologies (ICDCIT 2017), LNCS 10109, Springer, pp. 196-
209, India, 2017.
 Arjun Londhey and Manik Lal Das. Efficient Image Authentication
Scheme using Genetic Algorithms. In Proc. of International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2017), LNCS
10109, Springer, 172-180, India, 2017.
 Hardik Gajera, Shruti Naik and Manik Lal Das. On the security of
“Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth
Systems”. In Proc. of the International Conference on Information Systems
Security (ICISS 2016), LNCS 10063, Springer, pp. 324-335, India, 2016.
 Sarita Agrawal and Manik Lal Das. Node Revocation and Key Update
Protocol in Wireless Sensor Networks. In Proc. of the IEEE International
Conference on Advanced Networks and Telecommunications Systems
(ANTS 2016), IEEE, India, 2016.
 Sarita Agrawal, Jay Patel and Manik Lal Das. Pairing Based Mutual
Healing in Wireless Sensor Networks. In Proc. of the International
Conference on Communication, Systems & Networks (COMSNETS 2016),
IEEE, pp. 1-8, India, 2016.
 Jay Dave and Manik Lal Das. Securing SQL with Access Control for
Database as a Service Model. In Proc. of the International Conference on
Information and Communication Technology for Competitive Strategies
(ICTCS 2016), ACM Press, Article No. 104, India, 2016.
8
 Arun Krishnan and Manik Lal Das. Medical Image Security with Cheater
Identification Using Secret Sharing Scheme. In Proc. of the International
Conference on Signal, Networking, Computing, and Systems (ICSNCS-
2016), LNEE 395, Springer, India, 2016.
 Bhavya Bansal, Ronak Patel and Manik Lal Das. CheckPDF: Check What
is Inside Before Signing a PDF Document. In Proc. of the International
Conference on Signal, Networking, Computing, and Systems (ICSNCS-
2016), LNEE 395, Springer, India, 2016.
 Sarita Agrawal, Manik Lal Das, Anish Mathuria and Sanjay Srivastava.
Program Integrity Verification for Detecting Node Capture Attack in
Wireless Sensor Network. In Proc. of the International Conference on
Information Systems Security (ICISS 2015), Kolkata, India, LNCS 9478,
Springer, pp. 419-440, 2015.
 Payal Chaudhari, Manik Lal Das Anish Mathuria. On Anonymous
Attribute Based Encryption. In Proc. of the International Conference on
Information Systems Security (ICISS 2015), Kolkata, India, LNCS 9478,
Springer, pp. 378-392, 2015.
 Punit Mehta, Jigar Sharda and Manik Lal Das. SQLshield: Preventing SQL
Injection Attacks by Modifying User Input Data. In Proc. of the
International Conference on Information Systems Security (ICISS 2015),
Kolkata, India, LNCS 9478, Springer, pp. 192-206, 2015.
 Naveen Kumar, Anish Mathuria and Manik Lal Das. Achieving Forward
Secrecy and Unlinkability in Cloud-based Personal Health Record System.
In Proc. of IEEE International Symposium on Security, Privacy and
Anonymity in Internet of Things (TrustCom/BigDataSE/ISPA 2015),
Helsinki, Finland, IEEE, pp. 1249-1254, 2015.
 Naveen Kumar, Anish Mathuria and Manik Lal Das. Comparing the
Efficiency of Key Management Hierarchies for Access Control in Cloud. In
Proc. of International Symposium on Security in Computing and
Communications, Kelara, India, Springer Volume 536 of Communications
in Computer and Information Science, pp. 36-44, 2015.

 Nidhi Desai and Manik Lal Das. On the Security of RFID Authentication
Protocols. In Proc. of IEEE International Conference on Electronics,
Computing and Communication Technologies (CONECCT 2015), IEEE,
Bangalore, India, pp. 1-5, 2015.
 Manik Lal Das. Privacy and Security Challenges in Internet of Things. In
Proc. of the 11th International Conference on Distributed Computing and
Internet Technologies (ICDCIT 2015), Springer, February, 2015.

 Raghuvir Songhela and Manik Lal Das. Yet Another Strong Privacy-
Preserving RFID Mutual Authentication Protocol. In Proc. of International
Conference on Security, Privacy and Applied Cryptographic Engineering
(SPACE 2014), LNCS 8804, Springer, pp. 171-182, 2014.

 Naveen Kumar, Anish Mathuria and Manik Lal Das. An Efficient Time-
Bound Hierarchical Key Assignment Scheme. In Proc. of the International
Conference on Information Systems Security (ICISS 2013), Springer, LNCS
8303, pp.191-198, 2013.

9
 Manik Lal Das. Strong Security and Privacy of RFID system for Internet of
Things Infrastructure. In Proc. of the International Conference on Security,
Privacy, and Applied Cryptography Engineering (SPACE 2013), LNCS
8204, pp.56-69, Springer, 2013.
 Naveen Kumar, Anish Mathuria, Manik Lal Das and Kanta
Matsuura. Improving Security and Efficiency of Time-Bound Access to
Outsourced Data. In Proc. of ACM India Computing Convention, 9, 2013.
 Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria and Javier
Lopez. A Novel Key Update Protocol in Mobile Sensor Networks. In Proc.
of the International Conference on Information Systems Security (ICISS
2012), LNCS 7671, pp.194-207, Springer, 2012.
 Renu Aggarwal and Manik Lal Das. RFID Security in the context of
Internet of Things. In Proc. of the International Conference of Security of
Internet of Things, ACM Press, India, pp.51-56, 2012.
 Manik Lal Das. Grids Security without Public Key Settings. In Proc. of the
8th International Conference on Distributed Computing and Internet
Technologies (ICDCIT 2012), LNCS 7154 Springer, pp.253-254, February,
2012.
 C. Anudeep and Manik Lal Das. An Improved Scheme for False Data
Filtering in Wireless Sensor Networks. In Proc. of the 8th International
Conference on Distributed Computing and Internet Technologies (ICDCIT
2012), LNCS 7154 Springer, pp.62-70, February, 2012.
 Anil Mundra, Anish Mathuria and Manik Lal Das. Detecting flaws in
dynamic hierarchical key management schemes using specification
animation. In Proc. of the 8th International Conference on Distributed
Computing and Internet Technologies (ICDCIT 2012), LNCS 7154
Springer, pp.166-176, 2012.
 Sarita Agrawal and Manik Lal Das. Internet Of Things – a paradigm shift
for future Internet. In Proc. of the Second International Conference on
Current Trends in Technology (NUiCONE 2011), India, IEEE, 2012.
 Naveen Kumar, Anish Mathuria, and Manik Lal Das. On Classifying
Indirect Key Assignment Schemes for Hierarchical Access Control. In Proc.
of National Workshop on Cryptology, Surat, India 2010.
 Manik Lal Das. Secure and Efficient Authentication Scheme for Remote
Systems. In Proc. of the International Conference of Information
Technology (ICIT 2008), Bhubaneswar, India, IEEE, 2008.
 Manik Lal Das. Efficient User Authentication and Secure Data
Transmission in Wireless Sensor Networks. In Proc. of the IEEE
International Conference on Networks (ICON 2008), New Delhi, India,
IEEE Computer Society, 2008.
 Manik Lal Das and Ravi Mukkamala. Revisiting Bluetooth Security. In
Proc. of the International Conference on Information Systems Security
(ICISS 2008), Hyderabad, India, LNCS 5353, Springer, pp. 132-139, 2008.
 Manik Lal Das and V L Narasimhan. A Simple and Secure Authentication
and Key Establishment Protocol. In Proc. of the International Conference
on Emerging Trends in Engineering & Technology, India, IEEE, 844-849,
2008.
10
 Manik Lal Das and V L Narasimhan. Towards a Formal Verification of an
Authentication Protocol Using Non-monotonic Logic. In Proc. of the
International Conference of Information Technology – New Generation,
IEEE, pp.545-550, USA, 2008.
 Manik Lal Das and V L Narasimhan. EARS: Efficient Entity
Authentication in Remote Systems. In Proc. of the International Conference
of Information Technology-New Generation, IEEE, pp.603-608, USA, 2008.
 Manik Lal Das. Authentication Techniques: An Overview. In Proc. of
National Workshop on Cryptology, Cryptology Research Society of India,
2006.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. Cryptanalysis and
Improvement of a Multi-signature scheme. In Proc. of International
Workshop on Distributed Computing, LNCS 3741, Springer-Verlag, India,
pp.398-403, 2005.
 G. Thulasi, Manik Lal Das, and Ashutosh Saxena. An Efficient Scheme for
Digital Cash Using Bilinear Pairings. In Proc. of Annual National
Convention of the CSI, India, pp.349-357, 2005.
 G. Raju, G. M. Choudary, Manik Lal Das, Ashutosh Saxena, and V P
Gulati. Cryptanalysis of ID-based Key issuing Protocols. In Proc. of
National Workshop on Cryptology, India, 2005.
 Manik Lal Das and Ashutosh Saxena. Secure Protocol for Authentication
in Mobile-Communications. In Proc. of IEEE International Conference on
Mobile Business, IEEE, Australia, pp.23-27, 2005.
 Ashutosh Saxena, Manik Lal Das, and Anurag Gupta. MMPS: A Versatile
Mobile-to-Mobile Payment System. In Proc. of IEEE International
Conference on Mobile Business, IEEE, pp.400-405, 2005.
 G. M. Choudary, G. Raju, Manik Lal Das, and Ashutosh Saxena. An
Effective Certificateless Signature Scheme Based on Bilinear Pairings. In
Proc. of International Workshop on Security in Information Systems, USA,
pp.31-39, 2005.
 G. Raju, G. M. Choudary, Manik Lal Das, Ashutosh Saxena, and V P
Gulati. ID-based Serial Multisignature Scheme using Bilinear Pairings. In
Proc. of International Workshop on Security in Information Systems, USA,
pp.40-47, 2005.
 G. Raju, G. M. Choudary, Manik Lal Das, Ashutosh Saxena, and V. P.
Gulati. An Efficient Secure Key Issuing Protocol in ID-Based
Cryptosystems. In Proc. of IEEE International Conference on Information
Technology, IEEE Computer Society, USA, pp.674-678, 2005.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. A Security Framework
for Mobile-to-Mobile Payment Network. In Proc. of IEEE International
Conference on Personal Wireless Computing, pp. 420-423, 2005.
 Manik Lal Das. Authentication Techniques Using Smart Cards. Doctoral
Research Symposium, India, 2004.
 Ashutosh Saxena, Manik Lal Das, V. P. Gulati, and Deepak B Phatak.
Dynamic Remote User Authentication. In Proc. of International Conference
on Advanced Computing and Communications, India, pp.313-315, 2004.

11
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. A Novel Remote User
Authentication Scheme through Dynamic Login Identity. In Proc. of
International Workshop on Distributed Computing, LNCS 3326, Springer-
Verlag, pp.532, 2004.
 Manik Lal Das, Ashutosh Saxena, and V P Gulati. An Efficient
Multisignature scheme for E-Services, In Proc. of National Workshop on
Cryptology, Cryptology Research Society of India, India, 2004.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. An Efficient Proxy
Signature Scheme with Effective Revocation. In Proc. of International
Conference on Cybernetics and Information Technologies, Systems and
Applications, USA, pp.23-27, 2004.
 Manik Lal Das, Ashutosh Saxena, V. P. Gulati, and Deepak B Phatak. A
Key Management Scheme Based on Collision-resistant Hash Function and
Polynomial Interpolations. In Proc. of International Conference on Number
Theory for Secure Communications, India, pp.164-166, 2003.
 Manik Lal Das, Ashutosh Saxena, and V. P. Gulati. Proxy Signatures
Using Partial Delegation with Warrant. In Proc. of International Conference
on Number Theory for Secure Communications, India, pp.152-154, 2003.

Technical Reports
 Rahul Saranjame and Manik Lal Das. Image Authentication using Visual
Cryptography. Computing Research Repository - CoRR abs/1711.09032,
2017.
 Payal Chaudhari and Manik Lal Das. Cryptanalysis of Searchable
Anonymous Attribute Based Encryption. IACR ePrint Achieve, No.
2016/347, http://eprint.iacr.org/2016/347.
 Payal Chaudhari and Manik Lal Das. Privacy-preserving Attribute Based
Searchable Encryption. IACR ePrint Achieve, No. 2015/899,
http://eprint.iacr.org/2015/899.
 Sarita Agrawal, Jay Patel and Manik Lal Das. Pairing Based Mutual
Healing in Wireless Sensor Networks. IACR ePrint Achieve, No. 2015/538,
http://eprint.iacr.org/2015/538.
 Payal Chaudhari, Manik Lal Das and Anish Mathuria. Security
Weaknesses of an "Anonymous Attribute Based Encryption" appeared in
ASIACCS’13. IACR ePrint Achieve, No. 2014/1028,
http://eprint.iacr.org/2014/1028.
 Raghuvir Songhela, and Manik Lal Das. Wide-weak Privacy Preserving
RFID Mutual Authentication Protocol. IACR ePrint Achieve, No. 2013/787,
http://eprint.iacr.org/2013/787
 Harsh N. Thakker, Mayank Saha, Manik Lal Das. Reputation Algebra for
Cloud-based Anonymous Data Storage Systems. Computing Research
Repository – CORRabs/1304.4002(2013)
 Manik Lal Das. Comment- Practical Data Protection. Computing Research
Repository - CORR abs/0804.4628, 2008.

12
 Manik Lal Das. On the Security of “an efficient and complete remote user
authentication scheme”. Computing Research Repository - CoRR
abs/0802.2112, 2008.
 Manik Lal Das. Comments on “Improved Efficient Remote User
Authentication Schemes”. Computing Research Repository - CoRR
abs/0712.3037, 2007.
 G. Thulasi, Manik Lal Das, Ashutosh Saxena. Cryptanalysis of a recent
Remote User Authentication Scheme. International Association for
Cryptology Research, ePrint Report No. 2006/028, 2006.
 Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak. Algorithms and
Approaches of Proxy Signature: A Survey. Computing Research Repository
- CoRR abs/cs/0612098, 2006.
 Manik Lal Das, Ashutosh Saxena and V. P. Gulati. Security Analysis of
Lal and Awasthi’s Proxy Signature Schemes. International Association for
Cryptology Research, ePrint Report No. 2003/263, 2003.

Software 1) GSM SIM-based Mobile Payment Systems: The objective of this project
Systems was to develop a mobile payment system using SIM-enabled handheld
device. As the outcome of the project, we developed a payment system,
Delivered named mChq, which was released and used for real applications by
ZERO-MASS team. The pilot testing of the project was conducted by an
Industry consortium, several banks in India, IIT Bombay and IDRBT-
Hyderabad.

2) Multi-application Smart cards based Payment Systems: This was a


pilot project sponsored by the MCIT, Govt. of India for studying
feasibility and viability of chip-card based payment system in India during
2001-2003. The project was executed by an Industry consortium, IIT
Bombay and IDRBT-Hyderabad. We studied the feasibility of this project
and developed a prototype and test bed for this project. The pilot was
tested and found suitable for its commercialization as and when the
financial institutions willing to adopt this module.

3) Key Management system using Hardware Security Module for


Payment systems: The system was designed for master key generation for
smart card issuers and acquirers, and then personalization of cards at banks
for smart card based payment scenarios.

4) Public Key Certification Module for Certifying Authority: The


objective of the project was to develop the life cycle of the certification
process aiming to use the module in Certifying Authority project. The
module was designed, developed and tested using the real test cases for
managing of public key certificates.

13
Reviewer
Reviewer
 IEEE Transactions on Services and Computing
of Journals  IEEE Systems Journal
 IEEE Transactions on Cloud Computing
 IEEE Transactions on Knowledge and Data Engineering
 IEEE Transactions on Vehicular Technology
 IEEE Transactions on Information Forensics and Security
 ACM Transactions on Information and System Security
 IEEE Transactions on Wireless Communications
 IEEE Communications Letters
 IET Information Security
 Computer Communications, Elsevier
 Computers & Security, Elsevier
 Journal of Systems and Software, Elsevier

Technical Program Committee Member / Chair


Technical  Technical Program Committee member: ISEA ASIA Security & Privacy
Program Conference, 27 February – 1 March, 2020, Guwahati, India, 2020.
Committee  Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT’20), January 9 -
12, Bhubaneswar, India, 2020.
 General Chair: 2019 IEEE 16th India Council International Conference
(INDICON’19), December 13-15, 2019, Rajkot, India, 2019.
 Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT’19), January 9-
12, Bhubaneswar, India, 2019.
 Technical Program Committee member: ISEA International Conference on
Security and Privacy, January 9-11, 2019, Jaipur, India,
 Technical Program Committee member: IEEE International Conference on
Cloud Computing for Emerging Markets, 23-24 November 2018,
Bangalore, India.
 Technical Program Committee member: IEEE Symposium on
Computational Intelligence in Cyber Security (IEEE CICS’18) during Nov
18 and 21, Bengaluru, India.
 Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2018), January
11-13, Bhubaneswar, India, 2018.
 Technical Program Committee member: IEEE Symposium on
Computational Intelligence in Cyber Security (IEEE CICS’ 17) during Nov
27 and Dec 1, 2017, Hawaii, USA.

14
 Technical Program Committee member: International Conference on Soft
Computing and its Engineering Applications during Dec 1-2, Ahmedabad,
India, 2017.
 Advisor Board member. International Conference on Computing:
Communication, Networks and Security, 2018
 Technical Program Committee member: International Conference on
Information Systems Security (ICISS 2017), December 16-20, 2017,
Mumbai, India
 Technical Program Committee member: International Conference on Next
Generation Computing Technologies (NGCT-2017) during Oct, 2017,
Dehradun, India.
 Technical Program Committee member: International Conference on
Intelligent Communication and Computational Techniques, Jaipur, India,
2017.
 Technical Program Committee member: International Conference on Smart
Systems, Innovations and Computing, Jaipur, India, 2017.
 Technical Program Committee member: International Conference on Soft
Computing and its Engineering Applications, Vadodara, India, 2017
 PhD Conclave co-chair: ISEA ASIA Security & Privacy Conference, Jan
28-Feb 1, 2017, Surat, India.
 Technical Program Committee member: IEEE International Conference on
MOOCs, Innovation and Technology in Education (MITE 2016), December
9-10, , Madurai, India, 2016.
 Technical Program Committee member: International Conference on
Mathematics and Computing (ICMC 2017) during January 17-21, 2017,
Haldia, India.
 Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2017), January
13-18, Bhubaneswar, India, 2017.
 Technical Program Committee member: ACM Compute 2016, 21-13
October, Gandhinagar, 2016.
 Technical Program Committee member: International Conference on
Information Systems Security (ICISS 2016), December 16-20, 2016, Jaipur,
India
 Technical Program Chair: TENSYMP 2015, Gandhinagar, India, May 13-
15, 2015.
 Technical Program Committee member: IEEE International Conference on
Computing, Communication & Automation (ICCCA 2015), May 15-16,
2015
 Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2015), February
5-8, Bhubaneswar, India, 2015.
 Technical Program Committee member: International Conference on
Computing and Communication Systems, April 9-10, 2014, India.

15
 Technical Program Committee member: International Conference on
Mathematics and Computing (ICMC 2015) during January 05-10, 2015,
Haldia, India.
 Technical Program Committee member: IEEE International Symposium on
Signal Processing and Information Technology, 2014, India.
 Technical Program Committee member: International Conference on
Contemporary Computing. August 7-9, 2014, Noida, India.
 Technical Program Committee member. International Workshop on Mobile
Cloud Computing: Data, Management & Security, June 3-6 2013, Milan,
Italy.
 Technical Program Committee member. Second International Workshop on
Cloud Computing & Identity Management (CloudID 2013), Mysore, India,
22-25 August, 2013.
 Technical Program Committee member: International Conference on
Distributed Computing and Internet Technologies (ICDCIT 2013), February
5-8, Bhubaneswar, India, 2013.
 Technical Program Committee member: International Conference on
Intelligent Systems and Signal Processing (ISSP 2013), 1-2 March, 2013,
Vallabh Vidyanagar, Gujarat, India.
 Technical Program Committee member: Third International Conference on
Advances in Computing, Communication and Control (ICAC3 2013),
January Mumbai, India, 2013.
 Technical Program Committee member: International Workshop on Cloud
Computing and Identity Management (CloudID 2012), August 3-5,
Chennai, India, 2012.
 Technical Program Committee member: Workshop on the Security of the
Internet of Things (SecIoT 2011), Dalian (China), October 19, 2011.
 Technical Program Committee member: International Workshop on
Identity, Security, Management and Applications, Kerala, India, 2011.
 Technical Program Committee member: International Workshop on
Convergence Security in Pervasive Environments (IWCS 2011), Crete,
Greece, 2011.
 Technical Program Committee member: International Conference on
Computing, Communication, and Control, Mumbai, India, January 28-29,
2011.
 Technical Program Committee member: International Conference on
Information Science and Applications (ICISA 2010), Seoul, Korea, April
21st - 23rd, 2010.
 Finance Chair: International Conference on Information System Security
(ICISS 2010), December 15-19, 2010, Gandhinagar, India
 Technical Program Committee member: International Conference on
Intelligent Systems and Data Processing, Ahmedabad, India, January 24-25,
2011.
 Technical Program Committee member: Workshop on the Security of the
Internet of Things, Tokyo, Japan, November 29 - December 1, 2010.

16
 Technical Program Committee member: National Conference on Mobile
and Pervasive Computing (CoMPC 2010), Chennai, India, 2010.
 Technical Program Committee member: National Workshop on Cryptology,
India, 2009.
 Technical Program Committee member: The Fourth International
Symposium on Ubiquitous Applications & Security Services (UASS 2009),
USA, 2009.
 Technical Program Committee member: International Conference on
Emerging Trends in Computing (ICETiC 2009), India, Jan 08-10, 2009.
 Technical Program Committee member: IEEE International Conference on
Emerging Trends in Computing, India, 2008.
 Session Chair - Information Security and Privacy Track: International
Conference on Information Technology – New Generation, USA, 2008.

Invited/Expert Talks
Invited &  Blockchain Technology and Applications. BITS Pilani, November 10,
Expert Talks Pilani, India, 2019. [Invited Talk]
 Effective Password Management for Modern Digital Space. Charusat
University, March 30, Anand, India, 2018. [Expert Talk]
 Security and Privacy Challenges in the Internet of Things. Marwadi
University, March 18, Rajkot, India, 2017. [Invited Talk]
 Cyber Security Issues and Challenges. State-level Workshop on Emerging
Technologies, December 22, 2016, Ahmedabad, India. [Invited Talk]
 Security and Privacy Challenges in the Digital Age. State-level Seminar
Series on Emerging Technologies, 17-18 April, Ahmedabad, India, 2015.
[Invited Talk]
 Security and Privacy Challenges in the Digital Age. National Conference on
Innovative and Emerging Technologies, 17-18 April, Ahmedabad, India,
2015. [Keynote Talk]
 Privacy and Security Challenges in Internet of Things. International
Conference on Distributed Computing and Internet Technologies (ICDCIT
2015), February 5-8, Bhubaneswar, India, 2015. [ Invited Talk]
 Internet of Things – Challenges and Opportunities. International Conference
on Contemporary Issue in Engineering and Technology, March 19-21,
2014, Ahmedabad, India. [Keynote Talk]
 Security and Privacy Challenges in Internet of Things. SVNIT, Surat, India,
December 2013. [ Invited Talk]
 Security and Privacy Challenges in Internet of Things. Central University
Rajasthan, India, December 2013. [ Invited Talk]
 Elliptic Curves Cryptography. Central University Rajasthan, India,
December 2013. [ Invited Talk]
 Security in Wireless Networks. Haldia Institute of Technology, India,
December 2012. [ Invited Talk]

17
 Security and Privacy Challenges in Internet of Things. National Institute of
Technology, Surat, India, May 2011. [ Invited Talk]
 Identity-based Cryptography. National Institute of Technology, Surat, India,
May 2010. [ Invited Talk]
 Web Security. National Institute of Technology, Surat, India, January 2009.
[ Invited Talk]
 Dynamic Authentication. National Institute of Technology, Surat, India,
January 2009. [ Invited Talk]
 Identity-based Cryptosystems, Computer Science deptt., Western Kentucky
University, USA, May 2008. [ Invited Talk]
 Visited National Institute of Standards and Technology (NIST) in 2008
for attending the event on Federal Information Security Management Act
implementation project.
 Authentication Techniques, Computer Science department, Western
Kentucky University, USA, April 2008. [ Invited Talk]
 Authentication Protocol, International Conference on Information
Technology – New Generation, USA, January 2008.
 Certificateless Cryptosystems, National Institute of Technology, Surat,
India, October 2006.
 Authentication Techniques – from Password to Public key. GHP
Engineering College, Anand, India, November 2006.
 Design and Analysis of Authentication Techniques. K R School of
Information Technology, Indian Institute of Technology Bombay, 2006.
 Proxy Signatures. Institute for Development and research in Banking
Technology, India, 2005.
 Two-factor Authentication. International Conference on Distributed
Computing, India, 2005.
 Smart cards security. Institute for Development and Research in Banking
Technology, India, 2004.
 RSA-based Proxy Signatures. International Institute of Informatics and
Systemics, USA, 2004.
 Security architecture for mobile payment. International Conference on
Personal Wireless Computing, India, 2004.
 Authentication techniques using smart cards. Doctoral Symposium, India,
2004.
 Key Management Scheme. International Conference on Number Theory for
Secure Communications, India, 2003.
 Cryptanalysis for stereotyped message. National Conference on Cryptology
Research, India, 2003.

Programmes Organized
Involved in organizing many international/national conferences, workshops,
summer and winter schools and executive development programmes.

18
Pascal Lafourcade, University of Clermont, France
Research
Collaborators Javier Lopez, University of Malaga, Spain
Andrew Martin, University of Oxford, United Kingdom
Pardeep Kumar, Swansea University, United Kingdom
Kanta Matsura, University of Tokyo, Japan
Ravi Mukkamala, Old Dominion University, USA
Dipankar Dasgupta, Memphis University, USA
Laxmi Narasimhan, University of Newcastle, Australia
Rodrigo Roman, University of Malaga, Spain
Natalia Miloslavskaya, National Research Nuclear University, Russia
David Gerault, NTU, Singapore

along with many researchers in premier universities in India.

Manik Lal Das

19

You might also like