Publications.

Peer Reviewed Technical Publications (Partial List)

  • "Security Vulnerabilities in SMS based Applications Environment" tentatively accepted for publication in IEEE Security and Privacy.
  • Multifactor TLS Protocol for Holistic Security in Mobile Environment", Special Issue on 'Protocols for Resource, Link and Mobility Management for Wireless and Satellite Communication Networks' IETE Journal of Research, Vol. 52, Nos 2 &3, March-June 2006, pp 239-246
  • Mobile Number Portability: Making SMS Data Services Portable" Journal of Indian Institute of Science, Mar-Apr, 2006, pp 81-96
  • "Clean & Tidy", IEE Communications Engineer, pp 38-41, August/September 2005
  • "Artificial Hygiene: Non-Proliferation of Virus in Cellular Network", Journal of Systems and Information Technology, Volume 8, 1st December 2004, pp 10-22
  • "Information Services and Access Mechanism of Mobile Web for the Under-privileged", W3C Workshop on the Mobile Web in Developing Countries", December 5-6, Bangalore, India
  • Web " 'Greatest Equalizer' for the Developing World", proceedings of 16th International World Wide Web (WWW2007) Conference, 8-12th May 2007, Banff, Canada.
  • "SMS Virus and Threats to SS7 Network" revised version under review
  • Real-time detection and control of Distributed Denial of Service Attack", National Conference in Computer Network Security, Lucknow, October 2007
  • "Virus in Mobile Phones", accepted for presentation in International Conference on Embedded Systems, Mobile Communication and Computing (ICEMC2), August, 2007, Bangalore India
  • "Performance of Forward Secure Signature Schemes", accepted for presentation in International Conference on Embedded Systems, Mobile Communication and Computing (ICEMC2), August, 2007, Bangalore India.
  • "Security Protocols and Threats in Ad-hoc and Sensor Networks", accepted for presentation in International Conference on Embedded Systems, Mobile Communication and Computing (ICEMC2), August, 2007, Bangalore India.
  • "Latent Semantic Analysis Based Email Spam Filter", Accepted for presentation in AACC International Conference 2006, Kathmandu.
  • "Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks", Accepted for presentation in Conference on Information technology, Dec 18-21, Bhubaneswar, India, 2006.
  • "Verifiable AKA for Beyond 3G Wireless Packet Services", accepted for presentation in the Third International Conference on Wireless and Optical Communications Networks (WOCN2006)
  • "Security Challenges in Automotive System from Convergence with IT", Accepted for presentation SAEINDIA International Mobility Engineering Congress and Exposition, Chennai, India, October 2005
  • "Improving Presence and Reducing Missed Call in VoIP Networks through Mobile Paging", accepted for presentation in International Conference on Computer & Information Science, Kolhapur, India, December 2005
  • "Ubiquitous SMS Routing and Independent Service Creation", under revision (IEEE Transactions of Vehicular Technology)
  • "Toll Collection through affordable SMS", proceedings for International Conference on Communications and Computing, IIT-Kanpur, India, 4-6 February, 2005, pp 270-277
  • "Ubiquitous Rescue Operation at Affordable Cost through Location-Aware SMS", accepted for NCC 2005, IIT-Kharagpur, 28-30 January 2005
  • "Artificial Hygiene: A Critical Step Towards Safety from Email Virus", Proceedings of IEEE INDICON 2004, December 20-22, 2004, IIT Kharagpur, pp 484-489
  • "Ubiquitous-Trustworthy-Secure Data Communication in Hybrid Cellular-Internet Networks", Proceedings of IEEE INDICON 2004, December 20-22, 2004, IIT Kharagpur, pp 135-138
  • "Filtering of Undesirable Content in a Distributed Environment over the Internet", Proceedings of the Asia Pacific Conference on Parallel and Distributed Computing Technologies (ObComAPC2004), 13-15 December, VIT, Vellore, India, pp 1085-1101
  • "Trust and Security Realization for Mobile Users in GSM Cellular Networks", Proceedings of Asian Applied Computer Conference, Kathmandu October 29-31, 2004; LNCS 3285 pp-302
  • "Network Safety Using Trustworthy Computing" accepted for presentation in the 2004 International Conference on Information and Knowledge Engineering IKE2004
  • "Implementation of Multicasting Over an Access Network by Next Generation Internet Protocol", Proceeding of NCC2004 (National Conference on Communications)
  • Asynchronous Multi Factor Model (AMFM) of Security for Wireless MAN", Proceedings of IEEE Tencon2003; pp 656-660
  • "Information Assurance and Security needs in an ASP/MVNO Environment for Pervasive Content through SMS/GSM", Proceedings of ICBN2003 (International Conference on Communication and Broadband Networks), May 5-7, 2003, Bangalore, India
  • "Internet Protocol: Prospects and Challenges for 21st century", Proceedings of the Information Technology: Prospects and Challenges in the 21st century An International Conference (ITPC2003); May 23-26, 2003, Kathmandu, Nepal
  • "Global Service Portability and Virtual Home Environment through Short Message Service (SMS) and GSM" presented in 15th International Conference in Computer Communication (ICCC2002), 12-14 August 2002, Mumbai, India
  • "Ubiquity and Virtual Home Environment for Legacy Applications and Services" presented in 15th International Conference in Computer Communication (ICCC2002), August 2002, India
  • "Missed Call Information in Virtual Home Environment for GSM subscribers in Developing Countries", accepted for presentation in IEEE International Conference on IT and applications (ICITA2002), 25-29 November 2002, Australia
  • Software Protocol for Micro-payments over Cellular Networks, Proceedings of the Global Business Development Institute (GBDI) Conference. Bangalore (India), January 2001
  • On the method of Representative patterns using Binary Distance matrix, IEEE Transaction of Systems Man and Cybernetics, pp. 524-529, Vol. 10, No 8, August 1980
  • Use of Signal Processing Techniques is EEG signal analysis for the detection, location and character of disorder in cerebral circulations " presented at All India Conference on Electronics in Space, Calcutta, December 1976
  • Adaptive Control by matching the control law to the control situation using Pattern Recognition techniques " presented at All India Conference in Electronics in Space, Calcutta, 1976
  • Towards Computerized ECG, presented at All India Interdisciplinary Symposium on Digital Techniques and pattern Recognition, February, 1977

Books Authored

  • Authored book titled "Mobile Computing - Technology, Applications and Service Creation", South Asian edition published by Tata McGraw-Hill (ISBN 0-07-058807-4), released in September, 2005. This edition has been adopted as text book for Manonmaniam Sundaranar University (MSU), Tirunelveli, India, Pune University, India, International Institute of Information Technology - Bangalore.
  • Authored book titled "Mobile Computing - Technology, Applications, and Service Creation", International edition published by McGraw-Hill (ISBN 0071477330), released on August, 2006
  • Co-Edited "Applied Computing", Lecture Notes on Computer Science LNCS3285, Springer-Verlag, 2004, ISBN 3-540-23659-7
  • Co-Edited "Innovative Applications of Information Technology for the Developing World: Proceedings of the 3rd Asian Applied Computing Conference", Imperial College Press, 2007, ISBN-10: 1860948278; ISBN-13: 978-1860948275