Speakers

Invited Speakers

Biography:

Dr. Bimal Roy obtained B.Stat and M.Stat degrees from Indian Statistical Institute, Kolkata and Ph.d from University of Waterloo, Canada. He served as a professor at Indian Statistical Institute and was the Directorduring 2010 - 2015. Currently he is the head of R C Bose Centre for Cryptology and Security, Kolkata,He is also holding the position of Chairman, National Statistical Commission and Secretary, Cryptology Research Society of India since its inception in 2000.

His primary research interest involves all aspects of Statistics and its applications and currently he is working on Combinatorics, and application of Statistics in Cryptology and Design of Experiments. He has Supervised thirteen (13) PhD theses in four different technical areas -- 3 in Statistics, 7 in Computer Science, 1 in Mathematics and 2 in Statistical Applications.He has Published around forty (40) papers in refereed Journals; around twenty (20) book chapters, including proceedings for International Conferences; with over twenty (20) papers in Cryptology and Information Security, in reputed International Conferences and Journals.He has supervised around ten high budget projects in the area of cryptography and around ten projects in the area of statistics

He has received– IBM Faculty Award for research, teaching and initiative in Cryptology in 2007,Reliance Platinum Jubilee Award from National Academy of Science, India in 2007, Teacher’s Award from Indian National Science Academy in 2014, Padma Shri Award from Government of India in 2015. He is also a Fellowin National Academy of Sciences, India, since 2010 and Indian Society for Probability and Statistics, since 2014.

He has Conceptualized and initiated the R.C. Bose Centre for Cryptology and Security at the Institute, aimed to address the cryptographic needs of our Nation. He has Conceived and created the Sampling and Official Statistics Unit (SOSU) at Indian Statistical Institute to serve the Nation in these niche domains. Also he is the Founder-Secretary of the Cryptology Research Society of India, since inception in 2001.

Title of the Talk: E-Voting


Abstract:

E-voting has many issues that include 1) a voter casts her own vote, 2) a vote is stored as casted, 3) the vote is not compromised in the transition, 4) a vote is tallied as casted, 5) booth level privacy is not compromised. A solution to address all these will be presented. The key Crypto primitives used are: zero knowledge protocol, hashing, block chain and multiparty computation

Biography:

Dr. Alwyn Roshan Paisis a professor in the department of Computer Science & Engineering at NITK Suratkal. He obtained his B. Tech, from Mangalore University in. 1995, M.Tech, from Indian Institute of Technology, Bombay in 2004 and Ph.D, from National Institute of Technology Karnataka, Surathkal, in the year 2014. His areas of interest include Cryptography, Information Security, Image Processing and Computer Vision.

He was a chief investigator in the major projects like Development of Tool for Detection of SQL Injection vulnerability in Web Applications (2010 - 2012), MCIT - New Delhi, Information Security Education and Awareness Project, (2004 - 2014), MCIT- New Delhi and Information Security Education and Awareness Project Phase II (2015 - 2020), MCIT - New Delhi. He had been offered $10,000 in Google Cloud Platform credits under Google Cloud COVID-19 research credits program. 25-June-2020.

He was awarded for the Best Paper Appreciation/Prize Money at ISEA-ISAP 2020. His Biodata is included in Marquis Who’s is Who in Science & Engineering 2011. He secured best Paper Award, at CIP-2010, Bangalore, SECURWARE 2011, France, and CSI-Convention-2011.

Title of the Talk: Phishing URL detection and countermeasures


Abstract:

Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive information such as username, password, social security number or credit card number etc. Attackers fool the Internet users by masking the webpage as a trustworthy or legitimate page to retrieve personal information. There are many anti-phishing solutions such as blacklist or whitelist, heuristic and visual similarity-based methods proposed to date, but online users are still getting trapped into revealing sensitive information in phishing websites. In this talk I will be discussing different methods for the detection of phishing URLs and countermeasures

Biography:

Ashok Kumar Das received a Ph.D. degree in computer science and engineering, an M.Tech. degree in computer science, and an M.Sc. degree in mathematics and computing from IIT Kharagpur, India. He is currently an Associate Professorwith the Center for Security, Theory and Algorithmic Research, IIIT, Hyderabad, India. His research interests includecryptography, system and network security, Blockchain, security in Internet of Things (IoT), Internet of Vehicles (IoV), internet of Drones (IoD), smart grids, smart city, cloud/fog computing, intrusion detection, and AI/ML security.

He has authored over 280 papers in international journals and conferences in the above areas, including over240 reputed journal papers. He was a recipient of the Institute Silver Medal from IIT Kharagpur. He is on the editorialboard of IEEE Systems Journal, Journal of Network and Computer Applications (Elsevier), Computer Communications (Elsevier),Journal of Cloud Computing (Springer), Cyber Security and Applications (Elsevier), IET Communications,KSII Transactions on Internet and Information Systems, and International Journal of Internet Technology and SecuredTransactions.

He hasserved as one of the Technical Program Committee Chairs of the first InternationalCongress on Blockchain and Applications (BLOCKCHAIN'19), Avila, Spain, June 2019, International Conference on AppliedSoft Computing and Communication Networks (ACN'20), October 2020, Chennai, India, and second International Congress on Blockchain and Applications (BLOCKCHAIN'20), L'Aquila, Italy, October 2020. He has been included in the top 2% scientistsworld-wide (all fields) and also in the area of Networking & Telecommunications, with Rank world-wide (by subject area): 321for the year: 2021 and with Rank world-wide (by subject area): 580 for the year: 2020.

Title of the Talk: Blockchain-based Secure Data Delivery in internet of Drones


Abstract:

In this talk, at first, the Blockchain technology and its various real-life applications are discussed.Next, a novel Blockchain-envisioned secure data delivery and collection scheme for 5G-enabledInternet of Drones (IoD) environment (BSD2C-IoD) has been discussed. BSD2C-IoD not only provides access control mechanism among the drones and the Ground Station Server (GSS) in the flying zones,it also provides secure transactions among the drones, the GSSs and the Control Rooms (CRs) in theIoD environment, which are then used to form various blocks by the respective GSS. The formed blocksare then forwarded to a leader chosen among a set of the GSSs available in the Peer-to-Peer (P2P) GSS network and the leader take cares of the block for verification and addition of the blocksin the Blockchain maintained by the Blockchain center (BC) using the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. BSD2C-IoD is shown to be robust against a number of potentialattacks needed in the Blockchain. Finally, the performance analysis of BSD2C-IoD is also performed.

Biography:

Roland Haas is a professor at the International Institute of Information Technology Bangalore, India. He joined in April 2021 after a 15-year association with the institute as an adjunct and honorary faculty member. He has 25 years of professional experience in research, senior techno-managerial, business innovation and business development assignments in Germany, India, USA, Japan and Israel. Dr. Haas has broad experience in Automotive R&D, Aerospace R&D, Systems Engineering, Software & IT services, Consulting and Strategy.

From 1993 to 2006 he worked with the Daimler group, heading the Daimler India R&D Center in Bangalore, now called MBRDI, from 2001 to 2006. In 2007, Roland Haas founded the company QSO Technologies and worked with clients in Europe, US and East Asia. Roland Haas has co-authored several books; the most recent one being a textbook on Automotive Connectivity and Cyber security published by Springer. Dr. Haas was an adjunct faculty member of the Indian Institute of Science (IISc) and has done teaching and research in Cyber Security, Automotive Electronics, Car IT, Software technologies, Autonomous Systems, Management Information Systems and Virtual Product Creation. He is an Alumnus of the German National Academic Foundation (Studienstiftung des DeutschenVolkes) and the Mercedes-Benz Scholarship Foundation.

Dr. Haas studied Computer Science, Mathematics and Electronics at the University of Karlsruhe (now Karlsruhe Institute of Technology, KIT) and the Technical University of Clausthal.

Title of the Talk: An introduction to Automotive Cyber Security

Abstract:

Automotive Cyber Security addresses the cyber security of automobiles across the entire life cycle. The increasing connectivity, growing complexity of hardware and software and the rising number of cyber security incidents have brought automotive cyber security to the attention of the regulatory authorities. Automotive Cyber Security is governed by the UNECE WP.29 TF CS/OTA (Task Force on Cyber Security and Over-the-Air issues) guidelines that require an automotive OEM to deploy a Cyber Security Management System (CSMS) for type approval and to provide mechanisms for over-the-air updates of automotive software. In addition, the ISO 21434 standard provides a framework and describes the processes for developing cyber secure automotive systems. In this presentation, we give an overview of the field of Automotive Cyber Security and look at trends and challenges analyzing some examples of threats and potential attack scenarios, primarily in the domain of Advanced Driver Assistance Systems (ADAS) and Battery Electric Vehicles (BEV). We discuss the key steps in securing automotive systems including threat analysis, risk assessment, security requirements, and appropriate security measures. Looking ahead we outline some interesting research topics and problems like cyber security management systems, the security of automotive supply chains, and the link between automotive cyber security and the cyber security of critical infrastructures.

Biography:

Dr. S. R. M. Prasanna is Dean (Faculty Welfare, Research and Development) and Professor, Dept of Electrical Engineering at IIT Dharwad since July 2017. He was faculty member at the Dept of Electronics and Electrical Engineering at IIT Guwahati from August 2004 to July 2017. He was also Dean (Research and Development) from July 2015 to July 2017 at IIT Guwahati. He obtained his PhD in CSE from IIT Madras in 2004, MTech in Industrial Electronics from NITK Surathkal in 1997 and BE in Electronics from SSIT Tumakuru in 1994. He has guided 21 PhD Theses and 11 ongoing in the areas of Speech and Handwriting processing. He has published over 250 research articles in reputed Indian and International journals and conferences. He has executed large volume funded projects and also provided consultancy to many public sector and private limited companies in the areas of speech processing.

Title of the Talk: Privacy in Speech Processing

Abstract:

Speech mode is a fundamental mode of communication among humans as it is an effortless one. The focus of speech processing is developing approaches for human computer interaction. The different information sources present in the speech signal include message, speaker, language, emotion, health etc. All this information is exploited in human-human communication. When we are doing human-human communication in a closed setting across tables, this is all fine. However, if we are doing speech communication over long distances or using speech technologies that are integrated with public platforms like internet, YouTube, cloud, social media etc., there is a threat of allowing the speech signal to be manifested as it is. This is where the significance of privacy preservation comes into picture. The encryption of speech is one dimension of privacy preservation. There are many other dimensions for privacy preservation in speech processing. This talk will give an overview of the above-mentioned concepts.

Biography:

Kannan Srinathan is an assistant professor at IIIT-Hyderabad. He is an alumnus of IIT Madras where he did his Ph.D. in Computer Science and Engineering. His research interests include cryptography, distributed computing and quantum algorithms. He has published over 100 research papers in reputed International journals and conferences proceedings. He is a recipient of the IBM Outstanding PhD Dissertation Award, and Microsoft Young Faculty Fellowship Award.

Title of the Talk: ABCD of Modern Cryptography

Abstract:

This talk is about the central techniques of cryptographic design that are based on Axioms (of computing), Blunting (of communication), Complexity (of computation) and Decentralization (of trust).

Biography:

Dr. N.R.Sunitha, is Professor in the Department of Computer Science & Engg. at Siddaganga Institute of Technology, Tumkur. She obtained her engineering degree from Gulbarga University, Master’s from BITS-Pilani and Ph.D from Visvesvaraya Technological University, Tumkur. She is working at SIT, Tumkur for the past 29 years. Along with teaching, she guides UG and PG students on Research projects. Two students are pursuing their Ph.D under her guidance and four students are awarded Ph.D under VTU.

Her research interests include Information and Network Security, Storage Area Networks, HPC, Big Data Analytics, Machine Learning, Security issues in resource constrained environment and Blockchain Technology. She has published 75 research papers in National /International Conferences and 27 papers in International Journals. She is the Reviewer and on Editorial Board of some of the reputed journals.

She has executed 6 research projects funded by AICTE, DRDO and ABB GISL. Her Biodata is included in Marquis Who’s is Who in Science & Engineering 2010. She has received the IBM Mentor Award for the year 2014 and Women Achiever award from Institution of Engineers (India), Tumkur chapter for the year 2021. She has filed 6 patents and has a Copyright jointly with DRDO, New Delhi, on “Formal Verification of Security Protocols in Network Devices” dated: 21-10-2020.

Her administrative experience includes Head of the department during 2014-17, PG Co-Ordinator, Research Council Convener, MHRD Institution Innovation Council President at SIT,CSI Branch-Counselor, IEEE WIE Mentor and NAAC, NBA & NIRF Co-Ordinator

Title of the Talk: Scalability Issues in Blockchain Technology

Abstract:

Blockchain has established a stronghold in the domain of modern technology. The wider adoption of Blockchain has resulted in the intervention of Blockchain-based applications in our daily lives. Scalability is an important requirement in Blockchain networks as it refers to the network’s ability for supporting higher transaction throughput. With the increasing number of users in Blockchain systems, the growing issues of scalability call for introducing reliable Blockchain scalability solutions. Therefore, scalability is highly essential for the future growth of Blockchain. With scalability being one of the most prominent roadblocks for mainstream Blockchain adoption, it is inevitable to find efficient Blockchain scalability solutions. We will discuss the scalability challenges in Blockchain technology and some of the solutions available in the latest literature

Biography:

Purushothama B R obtained his Ph.D in Computer Science and Engineering from National Institute of Technology Warangal (NIT Warangal), India and did his M.Tech in Computer Science and Engineering from National Institute of Technology Karantaka (NITK) Surathkal, India. He is currently working as Associate Professor in the Department of Computer Science and Engineering at National Institute of Technology Goa. INDIA. His areas of interest are Cryptography, Key management, Cloud Security, Data Security, Provable Security, Network Security and Algorithms.

Title of the Talk: Secure Access Delegation

Biography:

Dr. P. K. Saxena had been an Outstanding Scientist and Director of one of the Premier Laboratories of DRDO – Scientific Analysis Group (SAG) located in Delhi. Presently engaged with Office of Principal Scientific Advisor to Govt of India as PSA Fellow . He joined Scientific Analysis Group, DRDO in 1981 as Scientist ‘C’ and became Scientist ‘G’ in 2002.He was appointed as Director of SAG w.e.f. May 2003 and headed the Lab till his superannuation in July 2014.Dr Saxena became Outstanding Scientist (Scientist ‘H’) in 2009.

His areas of interest include Algebra, Cryptology, Fuzzy Logic, Artificial Neural Networks, Information/Cyber Security and Speech Technology. He has published 65 research papers in National, International Journals and Conference Proceedings. Dr Saxena had been a member of Working Groups on Cyber Security & Technology Development in Regional Languages (TDIL) under MeiTy and chaired several Govt Committees for review of Projects funded by DRDO/MeiTy/O/o PSA. .

After joining O/o PSA, Dr Saxena has been involved in activities pertaining to Cyber Security, Machine Translation for Indian Languages, and Quantum Computing. He is Chairman Advisory Board and Member of Governing Council for Society for Electronic Transaction and Security (SETS) – an organization working in Chennai under O/o PSA.

Title of the Talk: Challenges in Securing Information

Abstract:

The lecture covers general introduction to Cyber Security, Goals of Cyber Security, The Means to achieve these Goals and Recent threats in Cyber Space.

Biography:

Did M.Sc. in Mathematics from Jiwaji University Gwalior, Ph.D. from IIT Delhi. Presently he has been working as a senior scientist in SAG DRDO Delhi.

His area of interest includes Cryptology, Information Security, High-Performance Computing, Computational algebra and Number Theory.

He has guided many M.Tech and Ph.D. Students, He has more than 25 papers in his his credit in national and international journals.

Title of the Talk: Applications of PKC in Secure Communication

Abstract:

In the age of information and communication technology, the demand of cryptographic algorithms is growing rapidly to provide security in communication among the users connected through the network such as LAN/WAN, internet, mobile, telephone, wireless communication, Wi-Fi, Bluetooth etc for speech, text data and fax. Nowadays, secure communication has not only been limited to Defence and commercial applications like internet banking but it has also become essential in any type of personal communication.

HAs we know, cryptography is broadly classified into two categories namely Symmetric Key and Public Key cryptography. The idea of Public Key Cryptography was introduced by Hellman Merkle and Diffie in 1976. Presently, in many communication systems, Public Key Cryptography (PKC) is being used for key exchange mechanisms and ensuring confidentiality. Public key cryptography is also an important mean to provide authentication and data integrity. The security of any public-key cryptographic scheme relies on some computationally hard problems derived from algebraic and number-theoretic structures.

HIn this talk, firstly we discuss some applications of Public Key Cryptography in Secure Communication. Next, the basic concept of complexity theory required to measure the strength of the crypto-systems will be discussed. Then, some important topics of number theory and algebra required for understanding public key crypto-systems will be reviewed. Thereafter, the complexity of some popular algorithms will be presented. Finally, some well-known public key crypto-systems such as RSA, ElGamal and elliptic curve public key crypto-systems with their security analysis will also be discussed.

Dr. R Balasubramanyan works in the area of analytic number theory. He is also interested in mathematical questions on cryptography, functions of a single complex variable and combinatorics. He is a fellow of Indian Academy of Science, Bangalore, Indian National Science Academy, New Delhi and the National Academy of Sciences, Allahabad. He is the recipient of Young Scientist award from Indian National Science Academy, Young associate of Indian Academy of Sciences, B.M. Birla award, S.S Bhatnagar Award , Srinivasan Ramanujan Birth Centenary Award of Indian Science Congress and Chevalier de l’Odrer Nationaldu Merite by French Government, Lifetime achievement award for Department of atomic energy and Padmashri award from Government of India. He is the president of Cryptology Research Society of India.

Title of the Talk: Elliptic Curve Cryptography

Biography:

Dr. Gururaj H L is currently working as Associate Professor in the Department of Computer Science and Engineering. He holds a Ph.D. Degree in Computer Science and Engineering from Visvesvaraya Technological University, Belagavi 2019. He has 12 years of teaching and research experience at both UG and PG level. He is a professional member of ACM. He is the founder of Wireless Internetworking Group (WiNG). He is a senior member of ACM, Life time member of Cryptology Society of India and Senior member of IEEE Computer Society.

Dr. Gururaj was appointed as ACM Distinguish Speaker (2018-2021) by ACM US council. He has received YOUNG SCIENTIST AWARD from ITS-SERB, Department of Science & Technology, Government of India in December 2016. He also received BEST PROJECT GUIDE award consecutively for three years at Malnad College of Engineering, India during 2015, 2016 and 2017. He has worked as a Special Editor of EAI publisher and Guest Editor of Multimedia Springer Journal. He is an Editorial Board member of various International Journals. He has four Edited Books in Springer, IET and IGI Global.

He is also serving as Advisory committee member of Cyber Security Council of India and Subject expert at Administrative Training Institute (ATI), Mysuru, Government of Karnataka. His research interests include Block Chain Technology, Cyber Security, Wireless Senor Network, Ad-hoc networks, IOT, Data Mining, Cloud Computing and Machine Learning

Title of the Talk: Role of AI in Cyber Security

Abstract:

In this digitized world, everything is changing from offline to online. Data plays a very vital role in this digital network. The theft or loss of USB devices, computers or mobile devices by an unauthorized person who gains the access to your mobile or laptop devices, email account or network is generally termed as data breach. Securing data from thefts and branches is a challenging issue. Adding extra intelligence using Machine Learning (ML) approaches will be efficient in identifying such attackers. In this lecture various ML techniques to identify data breaches such as malware attack, Man in the Middle (MIM), Spear phishing attack, eavesdropping attack, password attack, cross-site scripting attack will be depicted with suitable case studies. Artificial Intelligence (AI) capability to analyze massive quantities of data with lightning speed means security threats can be detected in real time, or even predicted based on risk modelling.