Left Navigation

Research Papers / Articles / Books - Authored by MeitY Officials

Research Paper: Ransomware Attack: An Evolving Targeted Threat[PDF]1.76 MB
Authors: Manuj Aggarwal


Research Paper: eSIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks[PDF]10.38 MB
Authors: Tulika Pandey, Prabhakar Krishnan, Kurunandan Jain, Shivananda R. Poojara, Satish Narayana Srirama, Rajkumar Buyya


Research Paper: Efficient and Secure Key Management for Conditional Access Systems
Authors: Om Pal, Bashir Alam
Published in: IEEE Transactions on Consumer Electronics, Vol. 66, No. 1, February 2020 (Sci Journal, h-index: 90)


Research Paper: Efficient and secure conditional access system for pay-TV systems
Authors: Om Pal, Bashir Alam
Published in: Multimedia Tools and Applications, vol. 78, no. 13, pp. 18835-18853, July 2019 (Springer, Sci Journal, h-index: 52)


Research Paper:Key Management for Blockchain Technology
Authors: Om Pal, Bashir Alam, Vinay Thakur, Surendra Singh
Published in: ICT Express journal (Scopus Index, ESCI, Elsevier, h-index: 11).


Research Paper: Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems
Authors: Om Pal, Bashir Alam
Published in: International Conference on Emerging Trends in Information Technology (ICETIT-2019), New Delhi, June 2019 ( Scopus indexed, Springer Book Chapter: Lecture Notes in Electrical Engineering, ISBN: 978-*******0694-9)


Research Paper:Cloud Security Assurance: ‘Elevation of Privilege’ Perspective
Authors: Vaishali Singh, S. K. Pandey, Om Pal
Published in: International Journal of Advanced Science and Technology Vol. 29, No. 1, January, 2020, pp. 1523 – 1531 (Scopus indexed)


Research Paper: Blockchain Technology and It’s Applications in E-Governance Services
Authors: Om Pal, Surendra Singh
Published in: International Journal of Recent Technology and Engineering (IJRTE), Volume-8 Issue-4, November 2019 (Scopus indexed)


Tutorial on- Taking Reuse to Next Level: Exploiting Transaction Level Modeling (TLM) for Universal Verification Methodology (UVM)

Author: Nishit Gupta

Year: 2018

Published in: Springer and proceedings of 22nd International Symposium on VLSI Design and Test (VDAT)

Novel Approach for Trace Driven Cache Memory Simulation for Symmetric Multiprocessing at TLM level

Author: Nishit Gupta

Year: 2018

Published in: Proceedings of Cadence User Conference (CDNLive) India 2018

Context Based Cassandra Query Language[PDF]1.15 MB

Author: SK Pandey, Sudhakar

Year: 2017

Published in: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE Xplore

An Approach to Improve Load Balancing in Distributed Storage Systems for NoSQL Databases: MongoDB[PDF]240.69 KB

Author: Sudhakar, SK Pandey

Year: 2018

Published in:Chapter of book series "Advances in Intelligent Systems and Computing" (AISC, volume 710), Online ISBN: 978-*******7871-2, Springer, Singapore

Tutorial on Transaction Level Modeling with SystemC for System Level Design[MSPPT]6.61 MB

Author: Nishit Gupta

Year: 2017

Published in: IEEE Xplore Digital Library and proceedings of 21st International Symposium on VLSI Design and Test (VDAT) at IIT Roorkee

National Policy for leveraging Common Services Centre (CSC) ecosystem for establishing Public Wi-Fi Broadband network[PDF]264.51 KB

Authors:Notan Roy, Pravin R. Chandekar
Year: 2017

Diffie-Hellman Key Exchange Protocol with Entities Authentication[PDF]575.26 KB

Authors: Om Pal, Bashir Alam
Year: 2017
Published in: : International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 4 April 2017

A Homomorphic Encryption Scheme Over Integers Based on Carmichael’s Theorem[PDF]573.02 KB

Authors: Pramod Kumar Siddharth, Om Pal, Bashir Alam
Year: 2016
Published in: : International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), December 2016
Indexed in: IEEE Explore Digital Library

Building an MPLS-TP Simulator[PDF]547.62 KB

Author: Vishal Negi, Umang Kumar, Tulika Pandey, Ashwin Gumaste

Electronic Waste and India[PDF]96.13 KB

Author: Dr. Sandip Chatterjee

AIM(AJAX Interfaced Multisequence)- BLAST(Basic Local Alignment Search Tool) -AJAX(Asynchronous Javascript and XML), Interfaced Multisequence Blast[PDF]789.34 KB

Authors: Alpana Dey, Krishna Kant, G. Aravindhan, R. Sathish Kumar, K. Subha, T.K.Subazini and G. Ramesh Kumar.
Published By: Proteomics Insights 2009: 2 Pages 9-13

Bio-sequence Signatures Using Chaos Game Representation[PDF]901.37 KB

Authors: Krishna Kant, Alpana Dey, Achuthsankar S. Nair, Vrinda. V. Nair and Arun K S. 
"Bioinformatics: Applications in Life and Environmental Sciences"- Chapter-7, pp. 62-76, Editor: M. H. Fulekar, Edition 2009
Published By: Springer Netherlands
Also Published By Capital Publishing, New Delhi.

Green Photonics a Broad Overview[PDF]896.47 KB

Authors: Dr. (Mrs.) Niloufer Shroff and Mrs. Sangeeta Hemrajani.  
Published By: IPAG journal Vol. 37, No. 5-6, Feb-March 2010