Download resume - Navodaya Institute of Technology, Raichur

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Nonlinear dimensionality reduction wikipedia , lookup

Transcript
RESUME
a) Name of the Candidate:
Addepalli V.N.Krishna
b) Permanent Address:
H.NO: 1-9-219 (New), 8-91/1 (Old),
NEW DILSUKHNAGAR COLONY,
HYDERABAD 500060.
B-7, NET Staff QTRS,
Navodaya Nagar, Raichur.
Present Address
c) Date of Birth:
26-06-65
d) E mail address:
[email protected]
e) Contact telephone :
Mobile :
09849520995
07899966787
Earlier position:
Principal & Professor of Computer Science & Eng..
Pujya Shri Madhavanji College of Engineering & Technology, Hyderabad.
Ratified by JNTUH, Hyderabad as Principal, Nov 14.
API Score accepted by JNTUH > 400.
Present position
Working as Professor & Head, CSE Dept., Navodaya Institute of Technology,
Raichur.
f) Academic Qualifications
Qualification
Discipline
Ph.d
Computer Science
& Engg.
M.Tech
Computer Science
M.E
Mechanical
B.E
Mechanical
Intermediate
M.P.C
University
Status
Acharya
Nagarjuna
University
Birla Institute
of Technology,
Mesra, Ranchi
Shivaji
University,
Maharastra
Osmania
University,
Hyderabad.
Intermediate
Awarded
Year of
Passing
2010, March
79%
2001,April
70%
1994, April
77%
1987,July
79.2%
1982
S.S.C.
board, Andhra
Pradesh.
Mathematics(Main) Secondary
board, Andhra
Pradesh.
68.5%
1980
g) Details of Research/Training Experience:
1. Worked as Professor of Computer Science & Engg at Staley College of Eng. & Tech.
for Women, Hyderabad from Dec 14 –June 15.
2. Worked as Professor of Computer Science & Engg. and Principal at
Pujya Sri Madhavanji College of Engg. & Tech., Hyderabad from July 2010 –Nov.2014.
3.Worked as Professor in Computer science, Indur Institute of Engineering and
Technology, Siddipet, Medak dist., Andhra Pradesh, India from 2004 July-2010 June.
4. Earlier worked as Head, Associate professor, Jyothismati Institute of Tech. & Science,
Karimnagar, A.P., from March 2000- June 2004.
5. Worked as Asst. professor in GNITS, Hyd. from Nov. 1997 –Feb. 2000.
6. Worked as lecturer in VSCE, Khammam from Aug 1996-Oct 1997.
7. Worked as Lecturer in GPREC, Kurnool from Aug 1994-May 1996.
8. Worked as Site Engineer in Vigneswara Engineering and Arudra Engineers between
1988-1992.
Guiding 3 PhD students for their Doctoral studies. One student is about to submit his
thesis in 2016 June.
Involvement with WASE Program (WIPRO ACADEMIC SOFTWARE
ENGINEERING) a Collaborative Program between WIPRO TECHNOLOGIES & BITS,
PILANI.
Handled subjects like Computer Organization and Database Management Systems,
Computer Networks & Network Security since 2004 as a member technical staff.
Projects done
1“ Some encryption algorithms in pager environment”. The work has been done in partial
fulfillment of project work for M.Tech, Computer Science.
2. “Inverse Heat Conduction technique in estimation of heat transfer through Rocket
nozzle throat”. Work has been done in partial fulfillment of project work for M.E.,
(Mechanical) in Defence Research & Development Labs, Hyderabad.
3. “Performance evaluation of New Encryption Models with emphasis on Probababilistic
Encryption and Time stamp in network security”, has been submitted in fulfillment of
Ph.D program.
h) Details of Papers Published:
international repute.
29 papers published In Journals of national and
i) Awards /Medals/ Honors Received
1. Stood first in the school in S.S.C
2. A valid GATE score of 90 percentile in Mechanical discipline.
3. Stood as best lecturer in G.N.I.T.S. (Eng. College) during 1997-1998 & 1998-1999.
4. Received Grant in Aid from A.I.C.T.E., to attend International conference, ICTTA 06,
Syria.
I , Addepalli.V.N.Krishna, Certify that the above information given by me is correct to
the best of my knowledge and belief. I strongly believe that a teacher has to continuously
upgrade his knowledge and continue in research activities which helps him to be a better
teacher. He imbibe not only knowledge but also discipline, dedication and moral values
to the student community which makes them not only technocrats but also good human
beings who can be a part in developing the country.
Avnkrishna
References
1. Dr.S.Krishna Murthy,
Associate Professor, Applied Mathematics dept.
Defence Institute of Advanced Technology,
Pune , India.
[email protected]
07798066628
2. Prof. EVLN Rangacharyulu,
Professor, Dept. of ECE,
Gitanjali college of eng. & Tech., Hyderabad.
[email protected]
07799033876
Papers published in Journals of National & International Repute.
----------------------------------------------------------------------------------------------------------1. Krishna. A.V.N : “ A New algorithm for Random number generation in network
security”, Journal for scientific & Industrial Research, Vol 64, Oct 2005, pp 791-793.
2. Krishna A.V.N., S.N.N.Pandit: “A new Algorithm in Network Security for data
transmission”, Acharya Nagarjuna International Journal of Mathematics and Information
Technology, Vol: 1, No. 2, 2004 pp 97-108.
3. Krishna A.V.N., A.Vinaya Babu: “Web and Network Communication security
Algorithms”, Journal on Software Engineering, Vol 1,No.1, July 06, pp 12-14 .
4. Krishna A.V.N, S.N.N.Pandit, A.Vinaya Babu: A generalized scheme for data
encryption technique using a randomized matrix key, Journal of Discrete Mathematical
Sciences & Cryptography, Vol 10, No. 1, Feb 2007, pp73-8, IF Still computing, 2013
5. Krishna A.V.N, A.Vinaya Babu: Pipeline Data Compression & Encryption Techniques
in e-learning environment, Journal of Theoretical and Applied Information Technology,
Vol 3, No.1, Jan 2007, pp37-43.
6.Krishna A.V.N, A.Vinaya Babu: A Modified Hill Cipher Algorithm for Encryption of
Data in Data Transmission, Georgian Electronic Scientific Journal: Computer Science
and Telecommunications 2007 !N0. 3(14) pp 78-83.
7.Krishna A.V.N, A.Vinaya Babu: Training of new probabilistic encryption scheme
Using a optimal key, Georgian Electronic Scientific Journal: Computer Science and
Telecommunications 2009 !N0. 2 pp 24-34.
8.A.V.N. Krishna, A.Vinaya Babu: A new mathematical model in encryption mechanism
with time stamp and acknowledgement support, International journal of Network
Security, Vol.11, No.3, PP.172-176, Nov. 2010
9 A.V.N. Krishna :A new variable length key for encryption mechanism in network
security, Journal of Computer Science, Jan - Feb 2010, Volume 4 Issue 2, pp 1423-1426
10.A.V.N. Krishna : Role of Statistical tests on New algorithms in network security,
International Journal on Advancements in Technology”, Vol 1, No.1 June 2010, pp 1325.
11.A.V.N. Krishna: A New non linear model in encryption mechanism with time stamp
and acknowledgement support, International journal of Network Security, Vol.13, No.3,
pp 202 -207, Nov. 2011
12. A.V.N. Krishna: A Mathematical model for Temporal data mining in estimation of
traffic data over a busy area, Journal on Software engineering, Vol 1, No.3, Jan-Mar
2007, pp 50-54.
13: A.V.N. Krishna: A Spatial Regression Analysis model for temporal data mining in
estimation of house hold data through different states in India, Georgian Electronic
Scientific Journal: Computer Science and Telecommunications 2009 !N0. 2(19) pp 6368.
14. A.V.N.Krishna: A Spatial regression Analysis model in estimation of traffic data over
a busy area, Georgian Electronic Scientific Journal: Computer Science and
Telecommunications 2007 !N0. 3(14) pp 78-83.
15. A.V.N.Krishna: A Mathematical model for estimation of Rural house hold data
through different states in INDIA, Georgian Electronic Scientific Journal: Computer
Science and Telecommunications 2009 !N0. 1(18) pp 51-57.
16. A.V.N.Krishna: Decision Support systems in estimation of heat transfer in rocket
nozzle throat, Atti della Foundation Giorgio Ronchi, Anno LXIII, n. 5, Sep-Oct 2008, pp
607-615.
17. A.V.N.Krishna : A new non linear Mathematical model with feedback mechanism in
Encryption Mechanism: International Journal on Advancements in Technology (IJOAT),
Vol1, No2, Oct 2010, pp 197-204
18. A.V.N.Krishna: Effect of Noise on Encryption mechanisms in MANET & WSN
Environments: International Journal on Advancements in Technology (IJOAT), Vol 2,
No1, Jan 2011 pp 14-21
19. A.V.N.Krishna: Probabilistic Encryption Based ECC Mechanism, International
Journal on Advancements in Technology (IJOAT), Vol 2, No 2 (April 2011) pp 257- 268.
20. A.V.N.Krishna: An Improvised ECC With probabilistic approach, Information
Security Journal, a Global perspective, Volume 21, Issue 1, 2012 , pp 28-35, IF Still
computing 2013
21. A.V.N.Krishna: Time Stamp Based ECC Encryption and Decryption,
International Arab Journal of Information Technology (IAJIT), Vol. 11, No. 3, May
2014, Impact factor 0.127.
22. AVN Krishna, K.Madhura vani: A Modified Hill Cipher using Randomized
Approach, International Journal of Computer Network and Information Security
(IJCNIS), Vol.4, No.5, June 2012 , pp 56-62 .
23. AVN Krishna: A simulation study , A model for comparative of ANALYTICAL
AND NUMERICAL methods in computing temperature distribution and Heat transfer
through Rocket Nozzle Throat, International Journal of Systems & Technologies, IJST
KLEF, 2010, Vol. 3, No. 2, pp 185-191.
24. AVN Krishna: Probabilistic (Multiple Cipher) Based ECC, Journal of Discrete
Mathematical Sciences & Cryptography, 15(2012), Issue No. : 06 (December)
25. AVN Krishna, S.Krishna Murthy: A Simulation method to Study the Heat transfer In
Rocket nozzle throat By Inverse Heat Conduction technique, Journal of Indian research
Vol. 1, No. 3, 2013.
26. AVN Krishna, S.Krishna Murthy: Inverse heat conduction in Rocket Nozzle throat by
multiple sensors &future time steps , International journal of Mathematical Modeling,
Simulation & applications(IJMMSCA), vol 5, No.3, 2012.
27. A.V.N.Krishna, A.Hari Narayana, K.Madhura Vani: Fully Homomorphic Encryption
with Matrix based Public Key Crypto Systems, Journal of Network and Information
Security, Volume 3 Issue 1 June 2015.
28. A.V.N.Krishna, A.Hari Narayana: Cubic Spline Curve Public Key Cryptography,
Accepted in Journal of Discrete Mathematical Sciences and Cryptography.
29. A.V.N.Krishna,
A.Hari Narayana, K.Madhura Vani: Fully Homomorphic Encryption
with Matrix based Digital Signature Standard, Accepted in Journal of Discrete
Mathematical Sciences and Cryptography.
Chapters Accepted
1. A.V.N.Krishna: A Randomized Cloud Library Security Environment, Cloud
Computing and Virtualization Technologies in Libraries, IGI Global publications,
USA.
Papers presented in International Conferences
1. AVN Krishna et. al “A New algorithm for Network security”, International conference
on Current trends in Information Technology, MERG 05, Oct. 1-3, pp 178-179.
2. AVN Krishna et al “A new minimized Probabilistic encryption algorithm for Data
transmission”, International conference on Information Security & Computer Forensics,
ISCF 06, pp 27-32.
3. AVN Krishna, A.Vinaya Babu” An improvised probabilistic encryption scheme using
a selective Matrix key’, IEEE IACC-09, 6-7 March pp 76-81.
4. AVN Krishna “ Temporal Data Mining in estimation of Empirical formula for House
Hold data analysis”, IJCAI-07, Workshop on Spatial & Temporal Reasoning, Jan 6-7.
5. Adi Narayana Reddy K, Vishnuvardhan B, Krishna A V N, Madhuviswanatham :
A Modified Hill Cipher Based on Circulant Matrices, accepted in C3IT-2012.
National Conference:
1.AVN Krishna, SNN Pandit “ A new algorithm for internet security”, Proceedings of
National Conference on E Learning , Challenges & opportunities in Indian context, 2004,
pp 189-194.
2. AVN Krishna et. Al “ A non linear optimized analysis of temperature distribution in
estimation of Heat transfer through Rocket nozzle Throat”, National conference on
Computational methods in Mechanical Engineering( COMPUTIME 05), Sep 05, pp 213215.
3. AVN Krishna, SNN Pandit “ Study of some Probabilistic algorithms in Network
security’, National conference on Emerging trends in Computer science & Engineering,
6-7 Jan 2006.
4. AVN Krishna, A.Vinaya Babu, “ Pipe line Data Compression & Encryption
Techniques
in
E
learning
environment”,
All
India
seminar
on
Role
of
Telecommunications for betterment of society, July 15-16, 2006.
Session Chair
International Conference as Chair-Technical Session International Conference on
Innovations in Computer Science & Engineering (ICICSE – 2014 & 2015) Hyderabad.
Guest lectures Presented
1. A.V.N.Krishna: Workshop on “ Object oriented Analysis & Design”, at Indur
Institute of Engineering & Technology, Siddipet, 30/06/2010.
2. A.V.N.Krishna: workshop on “ Role of Security Mechanisms in
Communication systems”, at Gurunanak Institute of Technology, 07/08/10.
3. A.V.N.Krishna: Workshop on “Information Security Technologies” at
JNTUH, 21/01/12.
4. A.V.N.Krishna: Talk on “ Network security concepts with emphasis on
Probabilistic encryption and time stamp”, at Defence Institute of Advanced
Technology, Pune 05/02/13.
Research area:
1. Time stamped Mathematical Model based ECC Mechanism in Cloud
Environment
Cloud computing is leading the technology development of today’s communication
scenario. This is because of its cost-efficiency and flexibility. In Cloud computing vast
amounts of data are stored in varied and distributed environment & security to data is of
prime concern. The security concept to data involves the primary concern. Elliptic Curve
Cryptography provides a secure means of message transmission among communicating
hosts using Diffie Hellman Key Exchange algorithm or ElGamal algorithm. In the
implementation of Elliptic Curve Cryptography (ECC), the message is transformed into
an affine point on the EC. Thus, by having key lengths of 160 bits, the ECC algorithm
provides sufficient strength against crypto analysis and whose performance can be
compared with standard algorithms like RSA with a bit length of 1024 bits. In the present
work, the plain text is converted to cipher text using ECC algorithm. Instead of
generating the cipher text as (C1 & C2), it is generated as C1 only by using probabilistic
model on ECC. As the proposed model is intended to be used in Cloud environment, a
new non- linear mathematical model is also used which considers a variable nonce value
and a dynamic time-stamp to generate a distributed sequence. The value of sequence is
multiplied with output of ECC algorithm to protect the data from hackers which is stored
in central servers. While the data is being retrieved from the servers, a query is being
used which uses the mathematical model to search for the data which is still in encryption
form. Final decryption takes place only at user’s site by using the private keys. Thus the
proposed model provides the fundamental security services like Authentication, Security
and Confidentiality to the transmitted message & also provides sufficient strength against
Crypto analysis in Cloud environment.
By considering a feedback mechanism for private key generation, the strength of the
proposed model can be increased still further. The model can also be studied for
increased performance against unavoidable factors like noise. Depending on the amount
of memory requirement, one can analyze the use of probabilistic time stamped non linear
mathematical model based ECC in small memory devices like smart cards and mobile
devices. One can try using randomized pseudo random number generators for choosing
the secret integer k, and the private key nB. ECC is a vast field where there is large scope
for higher research. And also work to be carried on different algorithms used in Scalar
multiplications of ECC algorithm and also to use Frobenius expansions in ECC
calculations which reduces the computational overhead of the proposed model.
The work will be extended to Hyper elliptic curves and a comparative study to be made
between ECC & Hyper ECC in terms of complexity, Computing power & Security.
2. Cubic Spline Curve Public Key Cryptography
In this work, a cubic spline curve is considered for Asymmetric mode encrypting data. A
steady state, one dimensional equation is integrated over a control volume. The
derivatives of above equation form piece wise linear profile, which leads to discretization
equation with corresponding weights. These weights are initially solved to generate
global variables. Those global variables are used to calculate public key which in turn use
the ElGamal mode of encryption. The proposed algorithm supports the features like
Authenticity of users, Security & Confidentiality of data transmitted.
Going by the construction of the algorithm, Encryption is being done on blocks of data
for which it consumes less computing resources. Going by complexity of the algorithm,
the key length needed is about 120 bit length to provide sufficient strengths against
cryptoanalysis.
Teaching interests.
1.Cryptography & network security
2 Relevance of CURVE BASED CRYPTOGRAPHY
3. Computer networks
4. Data base management systems
The institute is a prestigious institute of National importance. Working in such an
organization will help me in developing my personality and character. It gives me a
unique opportunity to share my knowledge with one of the best minds. I want to establish
a laboratory on Information security with emphasis on CURVE BASE
CRYPTOGRAPHY where research work can be undertaken at National and International
level.
Dr. A.V.N. Krishna, Professor & Head, CSE Dept., Navodaya Institute of
Technology, Raichur, guiding 3 Ph.D students for their Doctoral studies.
Many Papers published In Journals of national and international repute and
attended many national and international conferences.