Mrityunjay Singh

Assistant Professor

Qualification :
Ph. D. (IIT Guwahati, 2020)
Specialization : Theoretical Computer Science, Discrete Mathematics, Algorithms, Cryptography and Security
EXPERIENCE : Industry Experience: 7 Months: Eperium Business Solution, New Delhi

Research Experience: More than 10 Years (Including PhD) Teaching Experience: 4 Years: 1. LNMIIT Jaipur, 2.BITS Pilani Hyderabad, 3.VIT Bhopal 4.SRM University AP

Dr. Mrityunjay Singh joined as a Assistant Professor in November 2023. Prior to joining CUSB Gaya, he worked for two semesters as a Guest Faculty in LNMIIT Jaipur, for two years as an Assistant Professor (On Contract) BITS Pilani Hyderabad, for 11 months as an Assistant Professor VIT Bhopal, and for 11 months as an Assistant Professor SRM University AP. He taught various one semester UG/PG courses like Extreemal Combinatorics, Introduction to Complexity Theory, Discrete Mathematics, Formal Languages and Automata Theory, Convex Optimization, Design and Analysis of Algorithms, Compiler Design, C++ and JAVA Programming, Database Management Systems, etc. He guided a number of BTP students in the area of combinatorics and graphs on words and lattice based authentication protocol. He published one Book chapter and five SCIE journals.

Research Interests:

User Privacy preservation on the Internet especially in Online Social Networks (OSNs) would have a significant impact on their success. Now, people are becoming more cautious regarding their privacy. However, the existing mechanisms used by currently popular OSNs are not satisfactory. However to achieve user privacy on OSNs are very challenging because OSNs are developed with the philosophy of sharing information with others as much as possible. This contradictory philosophy makes the development of privacy preserving models a challenging task.
Currently I am working on preserving user privacy from other users and third-party applications by estimating the visibility of shared information then regulating the access to the information using ReBAC policy models.

Research (in APA Style)

  • Publications (Journals)
  1. Nemi Chandra Rathore, Priyank Gour, Bhagwan Sahay Meena, Vishal Jain and Neeraj Jain, Improved Clustering Protocol for Delay Minimization, International Journal of Computer Networking, Wireless and Mobile Communications, ISSN(P): 2250-1568; ISSN(E): 2278 – 9448, Vol. 3, Issue 5, Dec 2013, 41-48. (Peer-reviewed)
  2. Nemi Chandra Rathore, Somanath Tripathy, A Trust-based Collaborative Access Control Model with Policy Aggregation for Online Social Networks, Social Network Analysis and Mining, ISSN – 1869-5469 (Jan-2017). (E-SCI Journal & Scopus)
  3. Nemi Chandra Rathore, Somanath Tripathy, InfoRest: Restricting Privacy Leakage to Online Social Network App, (Submitted on 15 May 2019) (arXiv)
  4. Nemi Chandra Rathore, Somanath Tripathy, AppMonitor: Restricting Information Leakage to Third-party Applications, Social Network Analysis and Mining, ISSN – 1869-5469 (Jan-2020). (E-SCI Journal & Scopus)
  5. N. C. Rathore and S. Tripathy, “Effective Visibility Prediction on Online Social Network,” in IEEE Transactions on Computational Social Systems, doi: 10.1109/TCSS.2020.3042713.


b. Publications (Conferences)

  1. Neeraj Kumar, Pranay Tiwari, Nemi C. Rathore “Distance-based Data Aggregation in clustered WSN”, 1st national conference on Electronics Communication & Instrumentation, e-Manthan-2010, Jhansi conducted by IETE Gwalior.
  2. Chandra Rathore, N.; Verma, S.; Tomar, G.S., “CMAC: A cluster-based MAC protocol for VANETs, “International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010, vol., no., pp. 563, 568, 8-10 Oct. 2010. (Book Chapter: ISBN No. Electronic ISBN: 978-1-4244-7818-7, Print ISBN: 978-1-4244-7817-0, CD: 978-1-4244-7816-3
  3. Shashi Kant Tiwari, Nemi Chandra Rathore, Survey on VANET Privacy Preserving Protocols, Proceeding of International Conference on Recent Trends in Computer Science & Engineering, Feb-2014, Narosa Publishing House Pvt. Ltd, pp-80-90, ISBN – 9788184873917.
  4. Divya Kumari, Nemi Chandra Rathore, Inference Attacks in OSNs: A Survey, Proceeding of International Conference on Recent Trends in Computer Science & Engineering, Feb – 2014 Narosa Publishing House Pvt. Ltd, pp-91-100, ISBN- 9788184873917.
  5. Nemi Chandra Rathore, Somanath Tripathy, Joydeep Chandra, Predicting User Visibility in Online Social Networks Using Local Connectivity Properties, Distributed Computing, and Internet Technology, 11th International Conference, ICDCIT 2015, Bhubaneswar, India, Volume 8956, Lecture Notes in Computer Science pp 419-430., February 5-8, 2015, ISBN:978-3-319-14977-6 .
  6. Ashish Kumar, Nemi Chandra Rathore, Improving attribute inference attack using link prediction, In proceeding of International, conference on Recent Trends in Mathematics, Statistics & Computer Science 2015, World Scientific. http://dx.doi.org/10.1142/9789814704830_0046, ISBN:978-981-4696-16-6, 978-981-4704-84-7 (ebook)
  7. Abhinav Kumar and Nemi Chandra Rathore, Relationship Strength Based Access Control in Online Social Networks, International Conference on Information & Communication Technology for Intelligent Systems-2015, November 28-29, 2015, Ahmadabad, INDIA, pp 197-206, ISBN 9783319309262. DOI- 10.1007/978-3-319-30927-9.
  8. Nemi Chandra Rathore, Prashant Shaw, Somanath Tripathy: Collaborative Access Control Mechanism for Online Social Networks. Proceeding of 12th International Conference on Distributed Computing and Internet Technology, ICDCIT 2016, Pages 142-147.
  9. Nemi Chandra Rathore, Somanath Tripathy: Collaborative Access Control Mechanism for Online Social Networks. 6th IEEE International Advance Computing Conference (IACC-2016), Bhimavaram, Andhra Pradesh India, February 27th -28th 2016, ISBN 9781467382854, pp 19-24.
  10. Priyanka Kumari, Nemi Chandra Rathore, Fake profile identification on Facebook Through Social Media App, International Conference on ICT for Sustainable Development, 2016, PANAJI, GOA, INDIA, 1-2, July 2016. ISBN: 9789811039195
  11. Nemi Chandra Rathore, Somanath Tripathy, “Epidemic model based visibility estimation in Online Social Networks, in Proceedings of the 7th International Conference on Advances in Computing, Communications, and Informatics, (Poster Track) September 19-22 2018, Bangalore India (Book Chapter : Electronic ISBN: 978-1-5386-5314-2)

C.Patent:
D. Book

The research is mainly focused towards the following areas:

  1. In the area of Theoretical Computer Science, I am working in the area of combinatorics and graphs on words. In this area, earlier, I worked in pattern avoiding words and graphs on words.
  2. In the area of Security, I am working to design the post quantum (lattice, polynomial etc based) authentication protocols.
  • Publications (Journals)
  1. Benny George Kenkireth, Mrityunjay Singh.On the minimal alphabet size in multidimensional unrepetitive configurations Discrete Applied Mathematics, 255, 258-266(2019).
  2. Dheerendra Mishra, Mrityunjay Singh, Purva Reval, Komal Pursharthi, Neeraj Kumar, Ahmed Barnawi, Rajkumar Rathore Quantum-safe Secure and Authorized Communication Protocol for Internet of Drones,IEEE Trans. Vehicular Technology, (2023).
  3. Purva Reval, Dheerendra Mishra, Mrityunjay Singh, Komal Pursharthi, Ankita Mishra Quantum-safe Three-Party Lattice based Authenticated Key Agreement Protocol for Mobile Devices Journal of Information Security and Applications, 75, 10135 (2023).
  4. Mrityunjay Singh, Dheerendra Mishra Post-quantum secure authenticated key agreement protocol for wireless sensor networks, Telecommunications systems,1-13,(2023).
  5. Bshisht Moony, Amit Barnwal, Mrityunjay Singh, Dheerendra Mishra Quantum Secure Two Party Authentication Protocol for Mobile Devices Peer to Peer Neworking and Applications, DOI: 10.1007/s12083 − 023 − 01534 − 5.

    Title of the Book Chapters and Others : 1 No’s

 

  1. Mrityunjay Singh, Dheerendra Mishra, Security and Privacy Aspects of Authorized and Secure Communications in Dew-Assisted IoT Systems, Book name: Dew Computing: The Sustainable IoT Perspectives, (2024), Springer Nature Singapore, 79–101, isbn=978-981-99-4590-0, doi=10.1007/978-981-99-4590-0 4, https://doi.org/10.1007/978-981-99-4590-0 4.
  • Awards:
  1. Qualified GATE 2006, 2007, and UGC NET (Lectureship) 2012
  2. b. Projects:

The following Conference/Workshop/Short term Courses/FDP Attended and Volunteered:

  • Worked as volunteer in organizing FST&TCS 2014 8-12 Dec. 2014, IIT Guwahati
  • Research Promotion Workshop on Graph and Geometric Algorithms, IIT Guwahati 8-12 March 2021
  • Done TA work in Randomized Algorithms course on NPTEL
  • Done NPTEL FDP course on Randomized Methods on Complexity Theory (Category: Elite)
  • Done NPTEL FDP course on Quantum Algorithms and Cryptography (Category: Elite)
  • SGGIETS Nanded, International Workshop in Cryptology and Coding theory 8-12 March 2021
Scroll to Top