Dr. Jayaprakash Kar

Personal Information


Name Dr. Jayaprakash Kar
Designation Associate Professor
Department Computer Science & Engineering
URL
Date of Joining 19/08/2016
Research Area :
Cryptology, Provable Security and Random Oracle, Blockchain Technology, Information and Cyber Security.

Courses Taught

UG Courses Compiler Design, Formal Language and Automata Theory, District Mathematical Structure, Computer Security, Optimization Techniques & Applications, Cryptographic Algorithms, Coding Theory
PG Courses Cryptographic Algorithms

Contact Information


Address Room No-2107, Department of Computer Science and Engineering, The LNM Institute of Information Technology, Post-Sumel, Via-Jamdoli,Jaipur-302031 Phone-1416(O), +91-141 5191820
City JAIPUR
State RAJASTHAN
Country INDIA
Email Address jayaprakashkar@lnmiit.ac.in
Phone [Mobile] 9460521977
Office Extension 0

Academic Information


Degree/Diploma Institute/ Organization Year Branch/Specialization
5 Visiting Researcher/Scientist   University Of Waterloo, Canada 2017 Electrical and Computer Engineering
4 Ph. D.   (Doctor of Philosophy ) School of Mathematics, Statistics and Computer Science, Utkal University, Bhubaneswar, India 2011 Computer Science
3 M. Tech.   (Master of Technology ) School of Mathematics, Statistics and Computer Science, Utkal University, Bhubaneswar, India 2004 Computer Science
2 M.Phil   (Master of Philosophy ) Sambalpur University, India 1996 Mathematics
1 M.Sc.   (Master of Science ) Sambalpur University, India 1995 Mathematics

Project Information


 
Name of Project Total Cost of Project Funding Agency Duration From Duration To
1 A Novel Construction of Online/Offline Signature Scheme in Random Oracles for Wireless Security 950000 Sponsored by Deanship of Scientific Research (Distinct Research Study), King Abdulaziz University, Kingdom of Saudi Arabia 2014 2015

Research Publications


 
1 Jayaprakash Kar, Khirasagar Naik and Tamer Mostafa Abdelkader “A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks”, IEEE Systems Journal, Volume: 15, Issue: 3, Sept. 2021.    SEPT  2021      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-3.931 DOI : 10.1109/JSYST.2020.3015424


2 Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma and Jayaprakash Kar, Application of Consensus Protocols in Blockchain: A Research Survey, Security and Communication Networks, Wiley & Hindawi, Vol-2021, Article ID 6693731, https://doi.org/10.1155/2021/6693731    JAN  2021      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-1.791 DOI : https://doi.org/10.1155/2021/6693731


3 Jayaprakash Kar, Xiaoguang Liu , Fagen Li “CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks”, Journal of Information Security and Applications, Elsevier, Volume 61, 102905, 2021.    JULY  2021      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-3.872 DOI : https://doi.org/10.1016/j.jisa.2021.102905


4 Jayaprakash Kar, ELDA: an efficient and low-cost protocol for data authentication for IoT, Wireless Network, Springer, July 31, 2021.    JULY  2021      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-2.602 DOI : https://doi.org/10.1007/s11276-021-02739-3


5 Jayaprakash Kar, “Provably secure certificateless deniable authenticated encryption scheme”, Journal of Information Security and Applications, Elsevier, Volume 54, 102581, pp 2214-2126, October 2020.    OCT  2020      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-3.872 DOI : https://doi.org/10.1016/j.jisa.2020.102581


6 Jayaprakash Kar, Khirasagar Naik and Tamer Mostafa Abdelkader, An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security, IEEE Access, VOLUME- 7, pp: 184207 - 184220, 2019.    DEC  2019      
IndexedIn : [Scopus,WoS,UGC CARE List] SCI, IF-3.367 DOI : 10.1109/ACCESS.2019.2960291


7 Jayaprakash Kar and Khirasagar Naik, “Security Analysis and Implementation issues of Signcryption Scheme for Smart card”, International Journal of Business & Cyber Security, Vol.1 Issue 2, pp: 24-36, 2017.    JAN  2017      


8 Jayaprakash Kar “A Study of Key Management Protocols for Multicast Encryption”, International Journal of Innovative, Computing, Information and Control, Vol.13, Issue-2, pp-559-574, 2017.    MAR  2017      


9 Jayaprakash Kar "Cryptanalysis of Provably Secure Certificateless Short Signature Scheme by Solving Linear Diophantine Equations, ICIC Express Letters, Japan, Volume 11, Issue 3, pp-619-624, 2017.    MAR  2017      


10 Jayaprakash Kar “Cryptanalysis and Improvement of an Identity-based Proxy Multi-signature scheme", 11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland, LNCS Springer, pp-291-300,2017.    AUG  2017      


11 Jayaprakash Kar & Kshirasagar Naik “Generic Construction of Certificateless Signcryption Scheme” 12th International Conference on Information Systems Security (ICISS 2016), Jaipur, India, Springer- LNCS 10063, pp. 489–498, 2016, DOI: 10.1007/978-3-319-49806-5 28.    DEC  2016      


12 F. A. Alahmari , Turki. A. Alqarni and Jayaprakash Kar, “ A Research Survey of Ring Signature Scheme and Implementation Issues”, International Journal of Security and Its Applications, Vol. 10, No. 6, 2016, pp: pp.295-304, 2016, DOI: 10.14257/ijsia.2016.10.6.28.    JUN  2016      


13 S. A. Alhumrani and Jayaprakash Kar, “Cryptographic Protocols for Secure Cloud Computing”, International Journal of Security and Its Applications, Vol. 10, No. 2, 2016, pp: 301-310, 2016, DOI: 10.14257/ijsia.2016.10.2.27.    FEB  2016      


14 Jayaprakash Kar and Manoj Ranjan Mishra, “Mitigating Threats and Security Metrics in Cloud Computing”, Journal of Information Processing Systems(JIPS), Korea, Vol: 12, No: 2, pp: 226 - 233, 2016,DOI: 10.3745/JIPS.03.0049.    MAY  2016      


15 Jayaprakash Kar, Anser Ghazzaal Ali Alquraishee and Naomie Salim “ Short Online/Off-line Signature Scheme for Wireless Sensor Networks”, International journal of Information Security and Privacy(IJISP), IGI global, Vol. 9, No.1, pp: 47-61, 2015 , DOI: 10.4018/IJISP.2015010103.    MAR  2015      


16 Abeer M. AlMutairi , Rawan Abdullah Turdi AlBukhary and Jayaprakash Kar “ Security and Privacy of Big Data in Various Applications”, International Journal of Big Data Security Intelligence, SERSC, Korea, Vol.2, No.1, pp.19-24, 2015, doi: http://dx.doi.org/10.14257/ijbdsi.2015.2.1.03.    JAN  2015      


17 Jayaprakash Kar “Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles”, International Journal of Network Security, Taiwan, Vol.17, No.5, PP.580-587, 2015.    MAY  2015      


18 Jayaprakash Kar “Low Cost Scalar Multiplication Algorithms for Constrained Devices”, International Journal of Pure and Applied Mathematics, Vol.102, No.3, pp.579-592, 2015. doi: http://dx.doi.org/10.12732/ijpam.v102i3.14.    MAR  2015      


19 Manoj Ranjan Mishra, Jayaprakash Kar & Banshidhar Majhi, “Practical deployment of One-pass key establishment Protocol on Wireless Sensor Networks”, International Journal of Pure and Applied Mathematics, Vol(100), No-4, pp 531-542, 2015. Doi: http://dx.doi.org/10.12732/ijpam.v100i4.12.    APRIL  2015      


20 Jayaprakash Kar & Daniyal M. Alghazzawi “On Construction of Signcryption Scheme for Smart Card Security”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), US, pp-109-113, 2015. DOI: 10.1109/ISI.2015.7165948    MAY  2015      


21 Jayaprakash Kar “Online/Offline Ring Signature Scheme with Provable Security”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), US, pp-197-197, 2015. DOI: 10.1109/ISI.2015.7165979    MAY  2015      


22 Manoj Ranjan Mishra, Jayaprakash Kar & Banshidhar Majhi “One-Pass Authenticated Key Establishment Protocol on Bilinear Pairing for Wireless Sensor Networks" IEEE International Conference on Privacy and Security in Mobile Systems (PRISMS), 2014. pp-01-07 Doi: 10.1109/PRISMS.2014.6970595    MAY  2014      


23 Jayaprakash Kar “A Novel Construction of Aggregate Signcryption Scheme for Smart Card” IEEE 2nd International Workshop on Cyber Security and Privacy (CSP), International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Cyber Security and Privacy, China, pp-06-13, 2013. Doi:10.1109/CyberC.2013.11.    MAY  2014      


24 Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks, “Case Studies in Secure Computing Achievements and Trends”, CRC Press, Taylor and Francis (New York), Chapter-04, Pages 67–88, Catalogue No- K21540, Print ISBN: 978-1-4822-0706-4, eBook ISBN: 978-1-4822-0707-1, DOI: 10.1201/b17352-5, 2014.      2014      


25 A Novel Construction of Certificateless Signcryption Scheme for Smart Card, “Case Studies in Secure Computing Achievements and Trends”, CRC Press, Taylor and Francis (New York), Chapter-22, Pages 437–456, 2014, Catalogue No- K21540, Print ISBN: 978-1-4822-0706-4, eBook ISBN: 978-1-4822-0707-1, DOI: 10.1201/b17352-23, 2014.      2014      


26 Anser Ghazzaal Ali Alquraishee and Jayaprakash Kar “ A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks ”, Contemporary Engineering Sciences, HIKARI Ltd, Vol.(07), 2014, no.3, 135-147, 2014. doi: http://dx.doi.org/10.12988/ces.2014.3949    MAR  2014      


27 Jayaprakash Kar “Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network”, International Journal of Network Security, Taiwan, Vol.16 (01), PP.26-36, Jan. 2014.    JAN  2014      


28 Jayaprakash Kar “ID-based Deniable Authentication Protocol based on Diffie Hellman Problem on Elliptic Curve”, International Journal of Network Security, Taiwan, Vol.15 (05), PP.347-354, 2013.    MAY  2013      


29 Jayaprakash Kar, Daniyal M. Alghazzawi and Syed Hamid Hasan. “A Novel Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme with message recovery” INFORMATION-An International Interdisciplinary Journal, Japan Vol.16(01) (B), pp.807-814, Jan. 2013.    JAN  2013      


30 Jayaprakash Kar “Deniable Authentication Protocol based on Discrete Logarithms and Integer Factorization Problems” ICIC Express Letters, Japan, 2012. Vol. 7(07), pp 2061-2067, July 2013    JULY  2013      


31 Jayaprakash Kar “'Provably Secure Signcryption Scheme based on -Diffie-Hellman Problem for Wireless Security'” 2nd IEEE International Workshop on Cyber Security and Privacy (CSP), International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), China, pp-31-37, 2013. Doi: 10.1109/CyberC.2013.15.    MAY  2013      


32 Jayaprakash Kar “Provably Secure Identity-Based Aggregate Signature Scheme” IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), Cyber Security and Privacy, China, pp 137-142, 2012. doi:10.1109/CyberC.2012.30    MAY  2012      


33 Jayaprakash Kar “ID-based Deniable Authentication Protocol Suitable for Mobile devices” 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark, Springer- LNICST Vol-94, pp 160-171, 2012. Doi: 10.1007/978-3-642-30244-2_14.    MAY  2012      


34 Jayaprakash Kar “Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme” 5th International Conference on Information Security and Assurance (ISA 2011), Czech Republic, Springer- CCIS Vol- 200, pp 166-176, 2011. Doi: 10.1007/978-3-642-23141-4_16.    AUG  2011      


35 Jayaprakash Kar, Banshidhar Majhi “A Novel Deniable Authentication Protocol based on Diffie-Hellman Algorithm using Pairing techniques” ACM International Conference on Communication, Computing and Security (ICCCS 2011), NIT, Rourkela, India. pp-493-498, 2011. doi:10.1145/1947940.1948042.      2011      


36 Jayaprakash Kar “Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme” International Journal of Smart Home. Korea Vol.5 (4), pp 39-49, Oct 2011.    MAY  2011      


37 Jayaprakash Kar, Banshidhar Majhi & Mohammed Sajid Anwer “An Efficient Password Security of Multi-Party Key Exchange Protocol using Secret Sharing based on ECDLP” IEEE 2nd International Conference on Computer Engineering and Technology (ICCET 2010) China, Vol-3 pp-78-81, 2010. Doi:10.1109/ICCET.2010.5485778      2010      


38 Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Three Party Key Exchange Protocol based on ECDLP” 12th International Conference on Information Technology 2009 (ICIT 2009), Bhubaneswar, India, Tata McGrow Hill Education Private Limited, pp75-78, 2009.      2009      


39 Jayaprakash Kar & Banshidhar Majhi “Personal Authentication Protocol based on ECDLP using Bio-metrics Feature Values” International Journal of Computer Science and Network Security, Korea Vol.9 (6), pp 79-84, June 2009.    JUN  2009      


40 Jayaprakash Kar & Banshidhar Majhi “A Novel Fair Tracing E-Cash System based on Elliptic Curve Discrete Logarithm Problem” International Journal of Security and Its Application, Korea , Vol.3 (4), pp 9-24, October 2009.    APRIL  2009      


41 Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Three Party Key Exchange Protocol based on ECDLP” International Journal of Security & Its Applications, Korea, Vol.3 (4), pp 25-32, October 2009.    OCT  2009      


42 Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Multiparty Key Exchange Protocol based on ECDLP” International Journal of Computer Science and Security (IJCSS), Malyasia, Vol.3 (5),pp 405-413, Nov 2009.    NOV  2009      


43 Jayaprakash Kar & Banshidhar Majhi “A Secure Two-Party Identity Based Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem”, Journal of Information Assurance and Security, USA Vol-5(1),pp 473-482,2009.    JAN  2009      


Academic Experience

 
Name of Institute Post/Designation Duration From Duration To
1 King Abdulaziz University, Kingdom of Saudi Arabia Assistant Professor 2011 2016
2 Al Musanna College of Technology, Ministry of Manpower, Sultanate of Oman Assistant Professor 2006 2011

Training/Conferences/Short Term Courses Attended

Type Month Year Information
1 Training MAY 2020 AICTE Training And Learning (ATAL) Academy Online FDP on "Cyber Security" conducted by National Institute of Technical Teachers Training & Research, Chandigarh.
2 Training APRIL 2020 AICTE Training And Learning (ATAL) Academy Online FDP on "Blockchain Technology" conducted by JNTUA College of Engineering, Pulivendula.
3 Training MAY 2020 AICTE Training And Learning (ATAL) Academy Online FDP on "Data Science" conducted by JNTUA College of Engineering, Pulivendula.
4 Conference AUG 2017 11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland
5 Conference DEC 2016 International Conference on Information Systems Security (ICISS-2016), MNIT, Jaipur, India
6 Conference MAY 2015 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), Baltimore, Maryland
7 Conference FEB 2012 ACM International Conference on Communication, Computing and Security (ICCCS 2011), NIT, Rourkela, India
8 Workshop MAY 2008 Workshop on Quality Assurance and Strategic Planning, Sultanate of Oman

Training/Conferences/Short Term Courses Conducted

Type Month Year Information
1 Workshop APRIL 2021 AICTE-ISTE sponsored Induction/Refresher Programme - Faculty Development Programme (FDP) On Cyber Security
2 Workshop MAY 2021 AICTE-ISTE sponsored Induction/Refresher Programme- Faculty Development Programme on Digital Forensics and Cybercrime.
3 Workshop JUN 2021 AICTE Training and Learning Academy (ATAL) Faculty Development Program on Blockchain
4 Conference DEC 2021 22nd International Conference on Cryptology (Indocrypt 2021) -Organizing Chair
5 Conference DEC 2021 22nd International Conference on Cryptology (Indocrypt 2021)- PC member.
6 Training DEC 2020 AICTE-ISTE Sponsored Induction/Refresher Programs - Faculty Development Program on Blockchain Technology
7 Conference AUG 2017 Session Chair, 11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland
8 Workshop SEPT 2016 Session Chair(s): Workshops on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2016), The LNM Institute of Information Technology, Jaipur
9 Workshop MAR 2014 TPC Members, Workshop on Multidisciplinary perspective in Cryptology and Information Security (CIS 2014) - TPC member.
10 Training MAY 2010 Expert in the 2nd Oman Skills Competition, Sultanate of Oman
© 2018 LNMIIT All rights reserved. Designed by MasterSoft