Research Publications

Papers Published in 2005
  • "XSI - An XSD Based Universal User Interface"
    -- IEE ETSA - Enabling Technologies for Smart Appliances, January 12-14, 2005, Hyderabad by V.Radha, S.RamaKrishna.
  • "Security Analysis of the Mobile Two-way Messaging Systems"
    -- In ETSA-2005, 12-14 January, 2005, Hyderabad, by M. Choudary Gorantla, Raju Gangishetti and Ashutosh Saxena.
  • "WATS-SN: A Wireless Asset Tracking System"
    -- published in, IEEE International Conference on Personal Wireless Communications (ICPWC 2005,) New Delhi, India, January 23-25, 2005, by N Rajendran, Pushap Kamal, Debabrata Nayak, S Albert Rabara.
  • "Hierarchical Key Management Scheme Using Polynomial Interpolation"
    -- ACM System Interest Group - Operating Systems Review, Vol. 39, No. 1, pp. 40-47, [January 2005], by Manik Lal Das, Ashutosh Saxena, V. P. Gulati and Deepak B. Phatak.
  • "A Robust Wavelets Based Watermarking Scheme Using Chaotic mixing"
    -- communicated in January 2005 to The International Journal of Wavelets, Multiresolution and Information Processing (IJWMIP) and is under review, by Milind Engedy, M.V.N.K. Prasad and Ashutosh Saxena.
  • "Customer Focus Approach- It Is The Ultimate Goal For Success"
    -- AIMS Techno management paper presentation competition at Smt. SM Agarwal Institute of Management (AIMS), North Maharashtra University, Jalgaon Feb.13, 2005, by V. Visweswar and Imrana.
  • "Legal Aspects Addressing E-Commerce - Do They Need Remedy"
    -- AIMS Techno management paper presentation competition at Smt. SM Agarwal Institute of Management (AIMS), North Maharashtra University Jalgaon Feb.13, 2005, by V. Visweswar and K. Prasanna Rani.
  • "On Demand Location Based Associativity Routing for Mobile Ad-hoc Networks"
    -- Proceedings of the National Conference on Networks and Distributed Systems, Osmania University, Hyderabad (Organized by the Computer Society of India), pp.100-107, Feb. 25-26, 2005, by V.N.Sastry and P.Supraja.
  • "Digital Signature Based Customer Authentication for Internet Banking"
    -- published, National Conference on Computer Science and Informatics (NCCSI 2005), Trichy, India, 18-19 Feb 2005, by T. Harish Kumar, Ch. Venkateshwar Reddy, N.P. Dhavale.
  • "Phishing attacks and Preventions"
    -- accepted in the "National Conference on Computer Science and Informatics", Trichi, Feb 18-19, 2005, Soft proceedings, by Dinesh Phogat and D.P. Dube.
  • "Consumer Trust in Electronic Commerce"
    -- National Conference on Computer Science and Informatics, 18-19th February, 2005 Tiruchirapalli, by Mahil Carr, A. R. Dani and V. P. Gulati.
  • "Consumer Trust in Electronic Transactions"
    -- International Conference on Services Management, March 11-12, 2005, New Delhi, by Mahil Carr and A. R. Dani.
  • "An Enterprise Database Security Wrapper"
    -- International Conference on Services Management". March 11-12, 2005. New Delhi, by V.Radha, N.Hemanth Kumar.
  • "An Electronic Payment System Architecture for Composite Payment Transactions"
    -- In Proc. of IEEE International Conference on e-Technology, e-Commerce and e-Service, Hong Kong, March 29- April 01, 2005, by A. R. Dani, P. Radha Krishna and V. Subramanian.
  • "Continuous Call Double Auctions with Indivisibility Constraints"
    -- Accepted for presentation in 2005 IEEE International Conference on E-Technology, E-Commerce and E-Services at Hongkong March 29- April 1, 2005, by A. R. Dani, V. P. Gulati & Arun K. Pujari.
  • "An XML Schema Definition based Universal User Interface"
    -- Abhigyan. April 3 2005, Gwalior, by V.Radha, S.RamaKrishna.
  • "Public Key Infrastructure Based Security for Distributed Computing"
    -- selected for poster presentation, Abhigyan 2005, National Paper Presentation Competition, 3rd April 2005, Gwalior, India, by T. Harishkumar, Ch.Venkateshwar Reddy.
  • "An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems"
    -- In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), Volume-1, IEEE Computer Society, 4-6 April 2005, Las Vegas, USA, pp. 674-678, by Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena and V. P. Gulati.
  • "Wireless Sensor Networks: Platforms and Applications"
    -- et. al., accepted, CSI Conference on Current Trends in Computer Technology & Bioinformatics CONMICRO 2005, Lucknow, India, May 14-15, 2005, by Pushap Kamal, N. Rajendran.
  • "Churn Modeling in Personal Banking using Decision Trees"
    -- in proceedings of the 8th International Conference on Information Technology, Bhubaneswar, India, 2005, by V. Visweswar, V. Ravi, P. Radha Krishna, A. Sharma, G. Priyadarshi, R. K. Pati, R. Sahu and D. Singh.
  • "ID-based Serial Multisignature Scheme using Bilinear Pairings"
    -- Accepted at The Workshop on Security in Information Systems (WOSIS-2005), May 24-25, 2005, Miami, USA, by Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena and V. P. Gulati .
  • "An Effective Certificateless Signature Scheme Based on Bilinear Pairings"
    -- to appear in Workshop on Security in Information Systems (WOSIS-2005), May 24-25, 2005, Miami, USA, by M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das and Ashutosh Saxena.
  • "Efficient Auction Based System for Electronic Commerce Transactions"
    -- Accepted for presentation in ICEIS − 2005 − 7th International Conference on Enterprise Information Systems at Miami, USA, May 24-28, 2005, by A.R. Dani, Arun K. Pujari, V. P. Gulati.
  • "Design of Continuous Call Market with Assignment Constraints"
    -- Accepted for presentation in ICEIS − 2005 − 7th International Conference on Enterprise Information Systems at Miami, USA, May 24-28, 2005, by A.R. Dani, Arun K. Pujari, V. P. Gulati.
  • "Architecture for Composite Electronic Payment"
    -- 7th International Conference on Enterprise Information Systems (ICEIS− 2005) at Miami, USA, May 24-28, 2005, by V. Subramanian, P. Radha Krishna and A. R. Dani.
  • "Securing Enterprise Databases"
    -- ICEIS - International Conference on Enterprise Information Systems. May 24-28 2005, Miami, Florida, by V.Radha, N.Hemanth Kumar.
  • "Secure Multi Party Electronic Payment"
    -- accepted for presentation in 2005 IADIS International Conference e-Society 2005 at Qawra, Malta, June 27-30, 2005, by Y. Ramadevi, A. R. Dani, S. S. Subramanian.
  • "Survey of Cryptographic APIs: An Application Perspective"
    -- selected for CISTM, 05 (International Conference on information Science, Technology & Management), to be held on July 24-26, 2005, Delhi, India. M. Venkateswar Reddy, Harish Kumar and N.P. Dhavale .
  • "Integration of PMI with PKI for Management of Organization Resources"
    -- International Conference on information Science, Technology & Management (CISTM 2005), to be held on July 24-26, 2005, Delhi, India, by T. Harish Kumar, Ch. Venkateshwar Reddy, N.P. Dhavale.
  • "Selective Two Phase Commit Protocol for Composite Payment Transactions - Implementation Model"
    -- was accepted and presented, National Conference on Software and Informatics held at St.Joseph's College, Tiruchirapalli, by A R Dani and V Subramanian.
  • "A Survey on ID-Based Cryptographic Primitives"
    -- IACR eprint archive, available at http://eprint.iacr.org/2005/094, by M. Choudary Gorantla, Raju Gangishetti and Ashutosh Saxena.
  • "On Reduction of PKI's Bootstrapping Information using Threshold Signatures"
    -- presented at IKECCO-2005, 2nd International Conference on Electronics and Computer in Kyrgyzstan, by Ulanbek Sadybakasov, Ashutosh Saxena, Atul Negi.
  • "Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing"
    -- Journal of Universal Computer Science, vol. 11, no. 1 (2005), 122-149, by Ravi S. Veerubhotla, Ashutosh Saxena, V. P. Gulati and A. K. Pujari.
  • "Digital Watermarking Schemes Using Collusion Resistant Fingerprint Codes"
    -- National Conference on Recent Advance and Future Trends in IT, Patiala, March 2005, pp. 43−46, by Milind Engedy, M. V. N. K. Prasad and Ashutosh Saxena.
  • "New Polynomial Time Algorithms to Compute a Set of Pareto Optimal Paths for Multi− Objective Shortest Path Problem"
    -- International Journal of Computer Mathematics, UK, Vol.82, No.3, pp.289−300, March 2005, by V. N. Sastry, T. N. Janakiraman and S. Ismail Mohideen.
  • "Digital Watermarking Scheme Using Collusion Resistant Fingerprinting Codes"
    -- National Conference Recent Advances and Future Trends in IT (RAFIT-2005), 2-3 March, Punjabi University Patiala, pp. 43-43, 2005, by Milind Engedy, M.V.N.K. Prasad and Ashutosh Saxena.
  • "Outsourcing - Criteria and Issues"
    -- International Conference on Services Management 2005", Delhi, March 11−12, pp. 591-597, 2005, by Dinesh Phogat, A.R. Dani, D.P. Dube and V. Subramanian.
  • "Application of Data Mining for Developing Customer Relationship Management"
    -- In Proceedings of International Conference on Services Management, New Delhi, India, March 11-12, 2005, pp. 513-516., by K. Sai Krishna, Manish Kumar, M. V. Rao, P. Radha Krishna and A. Laha.
  • "Security Challenges for Mobile Commerce"
    -- In Proc. of International Conference on Services Management, New Delhi, India, March 11-12, 2005, pp. 478 - 481, by Manish Kumar, Pradeep Kumar, A. Laha and P. Radha Krishna.
  • "ALM Architecture for Indian Banks"
    -- Treasury Management, Special issue on ALM in Banks, ICFAI University Press, pp.31−46, April 2005, by V. N. Sastry and A. Radha Krishna.
  • "Comparison of Two Hybrid Routing Protocols for MANET"
    -- April 3,2005, IIITM, Gwalior, India. (Won 2nd Prize), by V.N. Sastry, and P. Supraja, Abhigyan.
  • "Intrusion Detection System using Sequence and Set Preserving Metric"
    -- IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), May 19-20, 2005, Atlanta, USA, by LNCS, Vol.3495 pp. 498 − 503, 2005 Pradeep Kumar, M. V. Rao, P. Radha Krishna, Raju S. Bapi Raju and A. Laha.
  • "Web usage mining using Rough Agglomerative Clustering"
    -- 7th International Conference on Enterprise Information Systems (ICEIS-2005), May 25-28, 2005, pp. 315-320 Miami/USA, by Pradeep Kumar, P. Radha Krishna, S. K. De and S. Bapi Raju.
  • "Location-Based Associativity Routing for MANET"
    -- Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Delta Centre-ville Hotel − Montreal, Canada (WiMob - 2005), August 22-24,2005, pp.49-56, by V.N.Sastry and P.Supraja.
  • "Discovering Fuzzy Association Rules With Interest and Conviction Measures"
    -- Ninth International Conference on Knowledge-Based Intelligent Information & Engineering Systems, 14 − 16 September, 2005, Australia, Springer LNCS Vol.3495, pp.498 - 503, 2005 by K. Sai Krishna, P. Radha Krishna, S. K. De.
  • "IS Phenomena"
    -- International Symposium on Research Methods" − ICIS, Washington D.C., December 2005, by Mahil Carr.
  • "Improving the QoS by using proactive caching algorithm in wireless LAN"
    -- National Conference on Mobile Computing (NCMC 2005), Chennai, Sponsored by IEEE Madras chapter, by N Rajendran, V.Madhav, S. Albert Rabara, V.P.Gulati.
  • "Fuzzy OLAP cube for Qualitative Analysis"
    -- In Proc. of International Conference on Intelligent Sensing and Information Processing, ICISIP-2005, Chennai, India, 2005, pp. 290-295. KVNN Pavan Kumar, P. Radha Krishna and S. K. De.
  • "From Contracts to E-Contracts: Modeling and Enactment"
    -- Information Technology and Management Journal, Vol. 6, No. 4, pp.363 - 387, 2005, by P. Radha Krishna, Kamalakar Karlapalem and A. R. Dani.
  • "Incorporating sequential information with classifier for building an efficient Intrusion Detection System"
    -- Abhigyan 2005, a national paper contest conducted by Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior (Won Second Best Paper Award), by M. Venkateswara Rao and Pradeep Kumar.
  • "Efficient Information Exchange Across Enterprises"
    -- Accepted for presentation and publication in the poster track of IEEE International Conference on Web Services (ICWS 2005), by V. Radha, Ved P. Gulati, A.Vedasri.
  • "Information Systems Security"
    -- in the International Conference on Trends in e-Payments and Retail Banking, New Delhi, September 2005, ISBN 81-202-0601-0, pp.17-25, by Ashutosh Saxena.
  • "Digital Watermarking Schemes Using Collusion Resistant Fingerprint Codes"
    -- National Conference on Recent Advance and Future Trends in IT, Patiala, March 2005, pp. 43-46, Milind Engedy, M.V.N.K.Prasad and Ashutosh Saxena.
  • "A two level watermarking scheme to double capturing attack"
    -- International Conference on Information Security, Pondicherry, December 7-9, 2005, pp. 249-253, ISBN: 81-7764-936-1, Milind Engedy, M.V.N.K. Prasad, Ashutosh Saxena.
  • "A Novel approach for palmprint classification using principal lines"
    -- International Conference on Information Security, Pondicherry, December 7-9, 2005, pp. 11-15, ISBN: 81-7764-936-1, P. Manoj, M.V.N.K. Prasad, Atul Negi.
  • "Singular Value Decomposition (SVD) Based Attack on Different Watermarking Schemes"
    -- International e-Conference of Computer Science, May 2005, ISBN 90-6764-425-0 Milind Engedy, Munaga.V.N.K.Prasad and Ashutosh Saxena.
  • "Designing fuzzy rule based classifier using self-organizing feature map for analysis of multispectral satellite images"
    -- International Journal of Remote Sensing, Volume 26, No 10, Pages 2219-2240, May 2005, N. R. Pal, A. Laha and J. Das.
  • "Parallel Algorithms for Identifying Convex and Non-convex Basis Polygons in an Image"
    -- Parallel Computing, Vol. 31, pp. 290-310, 2005, A. Laha, A. Sen and B. P. Sinha.
  • "Critical Views on Outsourcing in Indian Public Sector Banks"
    -- International Conference of Outsourcing: Contents and Discontents, 5-6 August, 2005, Udaipur by Mahil Carr and M. R. Patra.
  • "From Contracts to E-Contracts: Modeling and Enactment"
    -- accepted for publication by the Information Technology and Management Journal, by P. Radha Krishna, Kamalakar Karlapalem and A.R. Dani.
  • "Naive-Bayes Classification using Fuzzy Approach"
    -- International Conference on Intelligent Sensing and Information Processing, ICISIP-2005, Bangalore, India, pp 61-65, 2005, P. Radha Krishna and Supriya Kumar De.
  • "Using sub-sequence information with kNN for classification of sequential data"
    -- 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT 2005), December 22-24, 2005, Bhubaneswar, India, LNCS, vol. 3816, pp E1-E11, Springer, 2005, Pradeep Kumar, M. V. Rao, P. Radha Krishna and Raju S. Bapi.
  • "Churn Modeling in Personal Banking using Decision Trees"
    -- 8th International conference on Information Technology (CIT 2005), December 20-23, 2005, Bhubaneswar, India, V. Visweswar, V. Ravi, P.Radha Krishna, A. Sharma, G. Priyadarshi, R. K. Pati, R. Sahu and D. Singh.
  • "Functional Dependency Driven Auxiliary Relations Selection for Materialized Views Maintenance"
    -- In Proceedings of the 11th International conference on Management of Data, COMAD, January 6-8, 2005, pp. 37-45., Mukesh Mohania, P. Radha Krishna, KVNN Pavan Kumar, Kamalakar Karlapalem and M. Vincent.
  • "Mining Banks' Data Bases for Customer Profiling and Cross-selling"
    -- National Conference on Business Research, Coimbottore, 2005, P. Raj Bharath, M. Purna Chandar, Vishal Aggarwal, P. Radha Krishna and Arijit Laha.
  • "Predicting the Credit Worthiness of Corporate Customer of a bank"
    -- National Conference on Business Research, Coimbottore, 2005, Vishal Aggarwal, M. Purna Chandar, P. Raj Bharath, P. Radha Krishna and Arijit Laha.
  • "Generic XML Schema Definition to GUI Translator"
    -- in proceedings of the International Conference on Distributed Computing and Internet Technology, pp 290-206 (LNCS), 2005, by V. Radha, N. Pradeep Kumar and S. Rama Krishna.
  • "Anonymous Mobile Micro Payment"
    -- in proceedings of the 4th National Conferences on Business Research, PSG College, Coimbatore, December 3, 2005, by Mahil Carr and G. Shiva Prasad.
  • "Secure Anonymous Mobile Micro Payment"
    -- in proceedings of the International Conference on Information Security, Pondicherry Eng. College, Pondicherry, December 8, 2005, by Mahil Carr and G. Shiva Prasad.
  • "Applications of Intelligent Techniques in Retail Marketing"
    -- published as a book chapter in Retailing in the 21st Century: Current and Future Trends (Eds.) Manfred Krafft and Murali K. Mantrala, Springer Verlag, Germany, 2005 (ISBN: 3540283994), by V. Ravi, K. Raman and M. K. Mantrala.