Presented - Amity University

advertisement
Amity Institute Of Information Technology(AIIT)
AUUP Uttar Pradesh
Papers Presented in Conference
Year 2015
1.
Hans K. and Ahuja L. and Muttoo S.K., “Performance Evaluation of Neural Network
Training Algorithms in Redirection Spam Detection”, CSI Annual Convention on
“Digital Life” on 2-5 December , 2015.
2.
Nagpal S, Khatri S.K. and Kumar A; “Comparative Study of ERP Implementation
Strategies”, LISAT2015: 11th Annual Conference on Long Island Systems, Applications
and Technology, May 1, 2015, Farmingdale USA.
3.
Som S., “Encryption Technique Using Elliptic Curve Cryptography through Compression
and Artificial Intelligence”, International conference on CSI-2015, Theme: Digital Life,
Scopus Indexed, IEEE Explorer, 2-5 December 2015, IIC, Lodhi Road, New Delhi.
Year 2014
4.
Jha S.K. and Mishra D.K., “Analyzing Trustworthiness and Dependability for
Component Based Software through Reuse” National Conference at IMS Unison
University, Dehradun, 2014
5.
Sharma M. & Agrawal P.C., “ECC Implementation for Secured RFID Communication”,
International conference on Cryptography and Network Security, Malaysia, Dec 2014.
6.
Sharma M. and
Agrawal P.C., “ECC Implementation for Secured RFID
Communication”, International conference on Cryptography and Network Security
organized by ISAET, March 27-28, 2014, Malaysia.
Year 2013
7.
Hans K. and Ahuja L. and Muttoo S.K., “ Characterization and Detection of Redirection
Spam”, Wilkes-100 International Conference on Computer and Communications, Lovely
Professional University, Jallandhar, held on 15th- 16th November 2013
8.
Hans K. and Ahuja L., "Characterization and Detection of Redirection
Spam", Wilkes100, 2nd International Conference on Computing Sciences, Nov 15th16th, 2013
9.
Hans K., Bisht S. and Jain R., “Comparitive Analysis of Android and Symbian Operating
System” International Conference on Reliability, Infocom Technologies and
Optimization held at AIIT, Amity University Noida on 29-31st January 2013.
10.
Sharma M. and Agrawal P.C., “A Research Survey on RFID: Security & Privacy Issue ”,
The Fourth International Workshop on Ubiquitous Computing organized by Academy &
Industry Research Collaboration Center (AIRCC), May 24-26, 2013, Delhi.
11.
Sharma M. and Agrawal P.C., International conference on Cryptography and Network
Security organized by International Scientific Academy of Engineering and Technology,
“Secured Serverless RFID with Object Oriented Approach” April 23-24, 2013, Thailand.
12.
Sharma H., Bhatia A., Verma S. and Singh T., “Mitigating XSS Attacks”, International
Conference on Reliability, Infocomm Technologies and Optimization, Jan 2013
13.
Verma S., Singh T. and Shree S., “Study of Various Strings Matching Algorithm Suitable
for Efficient Hardware Implementation of Intrusion Detection System” in 7th
International Conference on Advanced Computing and Communication Technologies(
ICACCT – 2013). The International Conference was supported by CSI, IEEE Delhi
Section &Inderscience, 2013.
Year 2012
14.
Gupta H. and Gupta N., “Role of IT Applications in Banking Sector” in International
Conference on Computational Electronics and Nanotechnology (ICOCENT-2012)
organized by Amity University Rajasthan (AUR) in Amity University Rajasthan (AUR),
Jaipur on 1-2 March, 2012.
15.
Gupta H. and Sharma V., “Role of Speech Scrambling and Encryption in Secure Voice
Communication” in International Conference on Computational Electronics and
Nanotechnology (ICOCENT-2012) organized by Amity University Rajasthan (AUR) in
Amity University Rajasthan (AUR), Jaipur on 1-2 March, 2012.
16.
Hans K. and Chaudhary P.,“Future Trends in Cloud Computing”, International
Conference on Education and Research (ConFER 2012)organized by Computer Society
of India (CSI) and held at Lingayas University, Faridabad on 12-13 January 2012
17.
Jha S.K. and Mahapatra R. K., “Retrieving Reusable Software Component: A Critical
Survey, National Conference at Udaipur 2012
18.
Khatri S.K., Kumar D., Dwivedi A and Mirnal N, “Software Reliability Growth Model
with Testing Effort using Learning Function”, CSI 6th International Conference on
Software Engineering, Conseg-2012.
19.
Som S. and Banerjee M., “Cryptographic Technique Using Substitution through Circular
Path Followed By Genetic Function”, CCSN-2012 International Conference on
Computing, Communication and Sensor Network, November 22nd and 23rd, 2012,
Rourkela, Orissa, India.
20.
Verma S. and Singh T., “Automated Multilevel Defense Model to Investigate Packets for
Web Interface” in 9th IEEE International Conference on Wireless And Optical
Communication Networks and Next Generation Networks, WOCN’2012 held on 20-22nd
September’2012 in IIT, Indore.
Year 2011
21.
Gupta H. and Sharma V., “SSA: A Cryptographic Algorithm for Integrity Scanning of
Data Communication” in International Conference on Management Perspective
(ICOMAP 2011) organized by Amity University Rajasthan (AUR) in Amity University
Rajasthan (AUR), Jaipur on 24- 25 March, 2011.
22.
Gupta H. and Sharma V., “Padding Oracle Attack: An Attack on Security of Web
Applications” in International Conference on Management Perspective (ICOMAP 2011)
organized by Amity University Rajasthan (AUR) in Jaipur on 24- 25 March, 2011.
23.
Som S, Chatergee S. and Mandal J.S, (2011) “Key Based Bit Level Genetic
Cryptographic Technique (KBGCT)”, IEEE International Conference on Information
Assurance and Security (IAS 2011), IEEE Explorer, 5th to 8th December, 2011, Malacca,
Malaysia.
24.
Som S., Kundu S. and Mandal J.K.,“Artificial Intelligence Based Compression and
Elliptic Curve Based Encryption Technique Over Binary Finite Field”, International
Conference on Convergence of Optics and Electronics (COE-11), ISBN 978-81-9064011-4, 26TH – 27TH March, 2011, Science City, Kolkata, India.
25.
Verma S. and Singh T., “Multilevel Defense Model to Secure Large Organization Using
Effective Network Management strategy and Honeypots” in 3rd International
Conference on Future Computer and Communication (ICFCC 2011), 3rd – 5th June
2011.
26.
Verma S. and Singh T., ”Intrusion detection and Response using honeypots” at National
Conference and Workshop on “Recent Advances in Modern Communication Systems
and Nanotechnology” NCNCN 2011 organized by Centre of Converging Technologies,
University Of Rajasthan, Jaipur in association with IEEE, State DST, IETE, DRDO,
CSIR March 2011.
Year 2010
27.
Gupta H. and Sharma V., “Multiphase Encryption: A New Concept in Modern
Cryptography”, IEEE International Conference on Intelligent Network Computing
(ICINC 2010) organized by International Association of Computer Science &
Information Technology (IACSIT) at Kuala Lumpur, Malaysia on 26-28 November,
2010.
28.
Hans K., “Software Reliability : A Challenge To Deal With”, International Conference
on Reliability, Infocom Technology and Optimization (ICRITO’ 2010) organized by
Lingaya’s University, Faridabad and sponsored by Computer Society of India(CSI) held
on 1-3 November 2010.
29.
Hans K. and Chaudhary P., “Strategies for Digital Preservation” , National Conference
on Advances in Knowledge Management ,2010 (NCAKM 2010) held in Lingayas Institute
of Management and Technology, Faridabad from 8-9 March ,2010.
30.
Hans K. and Saini S., “ E-Learning: A New Way of Delivering Knowledge in the Digital
Age”, National Conference on Advance Computing and Communication Technology
2010 (NCACCT 2010) held at ABES Engineering College, Gaziabad from Feb26-27
,2010.
31.
Sharma M. & Goyal M., “Improving Security By Embedded RFID”, National
Conference on. Advance Computing & Communication Technology, 2010.
Year 2009
32.
Prof. Sunil Kumar Khatri, “Optimization Problem for modular Software with faults of
different severity based on Genetic Algorithm”, 4th International Conference on Quality,
Reliability and Infocom Technology (ICQRIT 2009), Dec 18-20, 2009, Delhi, India
33.
Dr. Deepak Kumar, “Optimal Component Selection of COTS based Software System
under Fuzzy Environment for Recovery Block Scheme” Presented in 4th International
Conference in Quality, Reliability and Infocom Technology (ICQRIT’2009) organized by
Delhi University, Delhi during 18 to 20 December’2009.
34.
Mr. Sandeep Mathur “Cryptography and Digital Signature” at ICQRIT 2009 at Delhi
University 2009.
Year 2004
35.
Ms. Tanya Singh, “Roadmap to Intelligent Organization through ILM” in AIMS
International Conference, at IIM, Calcutta (28-31 December, 2004).
Download