Person: Das, Maniklal
Loading...
Name
Maniklal Das
Job Title
Faculty
Email Address
Telephone
079-68261617
Birth Date
Specialization
Cyber Security, Privacy, Cryptography, Algorithms
Abstract
Biography
Maniklal Das is Professor of Computer Science at Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, India. Prior to joining DA-IICT in 2006, he worked with Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India. He has over 22 years of research and teaching experience in Information Security and Information Technology. His research works broadly cover all areas of Cyber Security and IT security management. He has served as a member of the technical program committee for many international conferences, and he is a regular reviewer of IEEE/ACM/Springer/Elsevier journals. He is currently on Editorial Board of IEEE Transactions on Dependable and Secure Computing. During his professional service, he has served as investigator of many sponsored research projects with national and international collaborators in the area of Security and Privacy.
Dr. Das received his Ph.D. degree from Indian Institute of Technology, Bombay and M.Tech. degree from Indian School of Mines, Dhanbad, India. He is a senior member of the IEEE and Life member of Cryptology Research Society of India.
Research Projects
Organizational Units
Name
29 results
Search Results
Now showing 1 - 10 of 29
Publication Metadata only MPEG Video Security using Motion Vectors and Quadtrees(Eu/Index, 30-09-2012) Singhal, Anshul; Das, Maniklal; DA-IICT, Gandhinagar; Singhal, Anshul (200701175)Publication Metadata only An Efficient Key Escrow-Free Identity-Based Signature Scheme(IJAER, 01-04-2017) Sahana, Subhas Chandra; Bhuyan, Bubu; Das, Maniklal; DA-IICT, GandhinagarPublication Metadata only Securing wireless sensor networks with public key techniques(Olyptr ldc Irldsus, 01-07-2008) Kumar, Vidhani; Das, Maniklal; DA-IICT, GandhinagarEmotional contagion is said to occur when an origin (i.e., any sensory stimuli) emanating emotions causes the observer to feel the same emotions. In this paper, we explore the identification and quantification of emotional contagion produced by music in human beings. We survey 50 subjects who answer: what type of music they hear when they are happy, excited, sad, angry, and affectionate. In the analysis of the distribution, we observe that predominantly the emotional state of the subjects does influence the choice of�tempo�of the musical piece. We define the footprint in three dimensions, namely, sentiment, time, and identification. We unpack each song by unraveling sentiment analysis in time, using lexicons and tenses, along with the identity via pronouns used. In this study, we wish to quantify and visualize the emotional journey of the listener through music. The results of this can be extended to the elicitation of emotional contagion within any story, poem, and conversations.Publication Metadata only Digital image protection using keyed hash function(IGI Global, 01-04-2012) Muraharirao, Siva Charan; Das, Maniklal; DA-IICT, Gandhinagar; Rao, Siva Charan Murahari (200501159)Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit LSB is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes MAC. The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.Publication Metadata only A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance(Springer, 01-06-2019) Sahana, Subhas chandra; Bhuyan, Bubu; Das, Maniklal; DA-IICT, GandhinagarThe identity-based cryptosystems furnish us with simplest key management procedures. Yet, they have a very slow adoption in cryptography due to the key escrow problem and the necessity of a secure channel between the user and the Private Key Generator (PKG) to transmit the created private key to the user. In this paper, we propose an identity-based signature scheme that not only solves the key escrow problem but also eliminates the requirement of the secure channel. The proposed scheme is secure against existential forgery under adaptively chosen message and ID attacks in the random oracle model assuming the hardness of the Computational Diffie�Hellmann Problem (CDHP). Furthermore, we compare the efficiency of our scheme to that of a similar established scheme.Publication Metadata only Dynamic program update in wireless sensor networks using orthogonality principle(IEEE, 13-06-2008) Joshi,; Akash,; Das, Maniklal; DA-IICT, Gandhinagar; Joshi, Akash (200301203)In this research two protocols are being proposed for analysing the utilization and blocking probability of each station to the access point. The first protocol is based on Markovian Queuing based Single channel Single Access Point protocol with Blocking Probability (MQSSABP) where the stations are associated with a single access point. The calculations are being done based on M/M/1/N based queuing model. It is necessary to avoid long block off time to measure the value of blocking probability. The measure of utilization and throughput has also been obtained in the work. The second protocol proposed is Markovian Queuing based Single channel Multi Access Point protocol with Blocking Probability (MQSMABP) where the stations may associate with various access points. The calculation has been done based on M/M/c/N based queuing model and the measure of utilization and throughput has been obtained. The performance of the protocols has been measured both numerically and through simulations.Publication Metadata only Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications(Springer, 01-01-2020) Das, Maniklal; Kumar, Pardeep; Martin, Andrew; DA-IICT, GandhinagarPrivacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found enormous scope in IoT applications such as consumer electronics, healthcare, tracking objects and transport system. In this paper, we present a privacy preserving authentication protocol for RFID system. The protocol provides mutual authentication of tag and reader, and preserves privacy of tags. We analyze the proposed protocol against active adversary and show that the protocol preserves narrow-strong privacy of the tags. We compare our protocol with the related work and show its usefulness in wide range of IoT applications.Publication Metadata only KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption(IEEE, 01-03-2022) Chaudhari, Payal; Das, Maniklal; DA-IICT, GandhinagarIn modern digital age, enterprise applications typically outsource user data in pubic cloud storage with the objective of availing flexibility and scalability features of cloud infrastructure, and importantly, making business goal more cost effective. Security and privacy concerns pose a challenging task to handle in cloud setup by both service providers and service consumers. In this landscape, before outsourcing the sensitive data on cloud storage, the data should be protected from unauthorized access and the privacy of the users should be preserved as per application requirement. In this article, we present a scheme, termed as KeySea, keyword-based search over attribute-based encrypted data with receiver anonymity. While searching documents pertaining to the target keyword(s), keeping receiver�s anonymity and ensuring data privacy are important features in applications like healthcare, bureaucracy, social engineering, and so on. The construction of the KeySea scheme uses the hidden access policy in attribute-based searchable encryption. The KeySea scheme provides a secure and practical solution to address the issue of privacy-preserving search over encrypted data in the public cloud storage. We show the security strengths of the KeySea scheme and its practicality with experimental results.Publication Metadata only Detection of Node Capture Attack in Wireless Sensor Networks(IEEE, 01-03-2019) Agrawal, Sarita; Lopez, Javier; Das, Maniklal; DA-IICT, Gandhinagar; Agrawal, Sarita (201121013)Wireless sensor networks (WSNs) deployed in hostile environments for applications such as battle-field surveillance are vulnerable to various attacks, including node capture attack wherein an adversary physically captures, reprograms, and redeploys a node in the network. In this paper, we present a novel approach of program integrity verification (PIV) protocol to detect whether a node is captured. The cluster head equipped with trusted platform module (TPM) verifies by comparing the program memory content of the sensor node before and after capture. The proposed TPM-enabled PIV (TPIV) protocol uses dynamically computed hash-based key and pseudorandom function for detection of a captured node in the network. The security analysis of the TPIV protocol reveals that the probability of a node capture attack victim eluding the PIV and leaking the secret of any noncaptured node is negligible. The proposed TPIV protocol can detect the captured node even in the presence of a strong adversary capable of putting additional memory to elude the PIV. With the results of analytical and experimental comparisons, we show the performance improvement of TPIV protocol in terms of low communication, computation, and storage overhead as compared to the related protocols for PIV in WSN.Publication Metadata only On the security of SSL/TLS-enabled applications(Elsevier, 01-01-2014) Samdaria, Navkar; Das, Maniklal; DA-IICT, Gandhinagar; Samdaria, Navkar (200501174)SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide�public key certificate�based�authentication, secure�session key establishment, and symmetric key based traffic confidentiality. A large number of electronic�commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of SSL/TLS-enabled web applications, particularly when naive users want to connect to an SSL/TLS-enabled web server. In this paper, we discuss about the MITM threat to SSL/TLS-enabled web applications. We review the existing space of solutions to counter the MITM attack on SSL/TLS-enabled applications, and then, we provide an effective solution which can resist the MITM attack on SSL/TLS-enabled applications. The proposed solution uses a soft-token based approach for�user authentication�on top of the SSL/TLS�s security features. We show that the proposed solution is secure, efficient and user friendly in comparison to other similar approaches.
- «
- 1 (current)
- 2
- 3
- »