Amity Institute Of Information Technology(AIIT) AUUP Uttar Pradesh Papers Presented in Conference Year 2015 1. Hans K. and Ahuja L. and Muttoo S.K., “Performance Evaluation of Neural Network Training Algorithms in Redirection Spam Detection”, CSI Annual Convention on “Digital Life” on 2-5 December , 2015. 2. Nagpal S, Khatri S.K. and Kumar A; “Comparative Study of ERP Implementation Strategies”, LISAT2015: 11th Annual Conference on Long Island Systems, Applications and Technology, May 1, 2015, Farmingdale USA. 3. Som S., “Encryption Technique Using Elliptic Curve Cryptography through Compression and Artificial Intelligence”, International conference on CSI-2015, Theme: Digital Life, Scopus Indexed, IEEE Explorer, 2-5 December 2015, IIC, Lodhi Road, New Delhi. Year 2014 4. Jha S.K. and Mishra D.K., “Analyzing Trustworthiness and Dependability for Component Based Software through Reuse” National Conference at IMS Unison University, Dehradun, 2014 5. Sharma M. & Agrawal P.C., “ECC Implementation for Secured RFID Communication”, International conference on Cryptography and Network Security, Malaysia, Dec 2014. 6. Sharma M. and Agrawal P.C., “ECC Implementation for Secured RFID Communication”, International conference on Cryptography and Network Security organized by ISAET, March 27-28, 2014, Malaysia. Year 2013 7. Hans K. and Ahuja L. and Muttoo S.K., “ Characterization and Detection of Redirection Spam”, Wilkes-100 International Conference on Computer and Communications, Lovely Professional University, Jallandhar, held on 15th- 16th November 2013 8. Hans K. and Ahuja L., "Characterization and Detection of Redirection Spam", Wilkes100, 2nd International Conference on Computing Sciences, Nov 15th16th, 2013 9. Hans K., Bisht S. and Jain R., “Comparitive Analysis of Android and Symbian Operating System” International Conference on Reliability, Infocom Technologies and Optimization held at AIIT, Amity University Noida on 29-31st January 2013. 10. Sharma M. and Agrawal P.C., “A Research Survey on RFID: Security & Privacy Issue ”, The Fourth International Workshop on Ubiquitous Computing organized by Academy & Industry Research Collaboration Center (AIRCC), May 24-26, 2013, Delhi. 11. Sharma M. and Agrawal P.C., International conference on Cryptography and Network Security organized by International Scientific Academy of Engineering and Technology, “Secured Serverless RFID with Object Oriented Approach” April 23-24, 2013, Thailand. 12. Sharma H., Bhatia A., Verma S. and Singh T., “Mitigating XSS Attacks”, International Conference on Reliability, Infocomm Technologies and Optimization, Jan 2013 13. Verma S., Singh T. and Shree S., “Study of Various Strings Matching Algorithm Suitable for Efficient Hardware Implementation of Intrusion Detection System” in 7th International Conference on Advanced Computing and Communication Technologies( ICACCT – 2013). The International Conference was supported by CSI, IEEE Delhi Section &Inderscience, 2013. Year 2012 14. Gupta H. and Gupta N., “Role of IT Applications in Banking Sector” in International Conference on Computational Electronics and Nanotechnology (ICOCENT-2012) organized by Amity University Rajasthan (AUR) in Amity University Rajasthan (AUR), Jaipur on 1-2 March, 2012. 15. Gupta H. and Sharma V., “Role of Speech Scrambling and Encryption in Secure Voice Communication” in International Conference on Computational Electronics and Nanotechnology (ICOCENT-2012) organized by Amity University Rajasthan (AUR) in Amity University Rajasthan (AUR), Jaipur on 1-2 March, 2012. 16. Hans K. and Chaudhary P.,“Future Trends in Cloud Computing”, International Conference on Education and Research (ConFER 2012)organized by Computer Society of India (CSI) and held at Lingayas University, Faridabad on 12-13 January 2012 17. Jha S.K. and Mahapatra R. K., “Retrieving Reusable Software Component: A Critical Survey, National Conference at Udaipur 2012 18. Khatri S.K., Kumar D., Dwivedi A and Mirnal N, “Software Reliability Growth Model with Testing Effort using Learning Function”, CSI 6th International Conference on Software Engineering, Conseg-2012. 19. Som S. and Banerjee M., “Cryptographic Technique Using Substitution through Circular Path Followed By Genetic Function”, CCSN-2012 International Conference on Computing, Communication and Sensor Network, November 22nd and 23rd, 2012, Rourkela, Orissa, India. 20. Verma S. and Singh T., “Automated Multilevel Defense Model to Investigate Packets for Web Interface” in 9th IEEE International Conference on Wireless And Optical Communication Networks and Next Generation Networks, WOCN’2012 held on 20-22nd September’2012 in IIT, Indore. Year 2011 21. Gupta H. and Sharma V., “SSA: A Cryptographic Algorithm for Integrity Scanning of Data Communication” in International Conference on Management Perspective (ICOMAP 2011) organized by Amity University Rajasthan (AUR) in Amity University Rajasthan (AUR), Jaipur on 24- 25 March, 2011. 22. Gupta H. and Sharma V., “Padding Oracle Attack: An Attack on Security of Web Applications” in International Conference on Management Perspective (ICOMAP 2011) organized by Amity University Rajasthan (AUR) in Jaipur on 24- 25 March, 2011. 23. Som S, Chatergee S. and Mandal J.S, (2011) “Key Based Bit Level Genetic Cryptographic Technique (KBGCT)”, IEEE International Conference on Information Assurance and Security (IAS 2011), IEEE Explorer, 5th to 8th December, 2011, Malacca, Malaysia. 24. Som S., Kundu S. and Mandal J.K.,“Artificial Intelligence Based Compression and Elliptic Curve Based Encryption Technique Over Binary Finite Field”, International Conference on Convergence of Optics and Electronics (COE-11), ISBN 978-81-9064011-4, 26TH – 27TH March, 2011, Science City, Kolkata, India. 25. Verma S. and Singh T., “Multilevel Defense Model to Secure Large Organization Using Effective Network Management strategy and Honeypots” in 3rd International Conference on Future Computer and Communication (ICFCC 2011), 3rd – 5th June 2011. 26. Verma S. and Singh T., ”Intrusion detection and Response using honeypots” at National Conference and Workshop on “Recent Advances in Modern Communication Systems and Nanotechnology” NCNCN 2011 organized by Centre of Converging Technologies, University Of Rajasthan, Jaipur in association with IEEE, State DST, IETE, DRDO, CSIR March 2011. Year 2010 27. Gupta H. and Sharma V., “Multiphase Encryption: A New Concept in Modern Cryptography”, IEEE International Conference on Intelligent Network Computing (ICINC 2010) organized by International Association of Computer Science & Information Technology (IACSIT) at Kuala Lumpur, Malaysia on 26-28 November, 2010. 28. Hans K., “Software Reliability : A Challenge To Deal With”, International Conference on Reliability, Infocom Technology and Optimization (ICRITO’ 2010) organized by Lingaya’s University, Faridabad and sponsored by Computer Society of India(CSI) held on 1-3 November 2010. 29. Hans K. and Chaudhary P., “Strategies for Digital Preservation” , National Conference on Advances in Knowledge Management ,2010 (NCAKM 2010) held in Lingayas Institute of Management and Technology, Faridabad from 8-9 March ,2010. 30. Hans K. and Saini S., “ E-Learning: A New Way of Delivering Knowledge in the Digital Age”, National Conference on Advance Computing and Communication Technology 2010 (NCACCT 2010) held at ABES Engineering College, Gaziabad from Feb26-27 ,2010. 31. Sharma M. & Goyal M., “Improving Security By Embedded RFID”, National Conference on. Advance Computing & Communication Technology, 2010. Year 2009 32. Prof. Sunil Kumar Khatri, “Optimization Problem for modular Software with faults of different severity based on Genetic Algorithm”, 4th International Conference on Quality, Reliability and Infocom Technology (ICQRIT 2009), Dec 18-20, 2009, Delhi, India 33. Dr. Deepak Kumar, “Optimal Component Selection of COTS based Software System under Fuzzy Environment for Recovery Block Scheme” Presented in 4th International Conference in Quality, Reliability and Infocom Technology (ICQRIT’2009) organized by Delhi University, Delhi during 18 to 20 December’2009. 34. Mr. Sandeep Mathur “Cryptography and Digital Signature” at ICQRIT 2009 at Delhi University 2009. Year 2004 35. Ms. Tanya Singh, “Roadmap to Intelligent Organization through ILM” in AIMS International Conference, at IIM, Calcutta (28-31 December, 2004).