Dr. Ravi Shankar Nanduri

Qualification : Ph.D. (JNTUH, Hyderabad)

Details of Educational Qualification:

Course Specialization Group College Name/University Year of Passing
Ph.D. CSE CSE JNTUH, Hyderabad 2011
M.Tech. CSE CSE M.I.T., Manipal University 2000
B.Tech. Civil Engineering Civil Engineering K.L.C.E., Acharya Nagarjuna University 1988

 

List of Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 "A Novel Block Cipher with the Blending of the Hill Cipher and the Playfair Cipher" Journal of Xidian University (scopus), 16(1):207-217. https://doi.org/10.37896/jxu16.1/021, 2022
2 "A Large Block Cipher with the Blending of the Hill Cipher and the Playfair" Journal of Xidian University (scopus), 16(1):232-242. https://doi.org/10.37896/jxu16.1/023, 2022
3 "Smart Algorithms To Secure Web Based Applications From Sql Injection Attacks" Journal of Xidian University (scopus), 16(2):298- 304. https://doi.org/10.37896/jxu16.2/026, 2022.
4 "Surgical Striking Sql Injection Attacks Using LSTM" Indian Journal of Computer Science and Engineering (IJCSE) (scopus), 13(1):208-220. DOI : 10.21817/indjcse/2022/v13i1/221301182, 2022
5 "Building Security Barriers By Modified Algorithms In Blockchain To Prevent Sql Injection and XSS" Indian Journal of Computer Science and Engineering (IJCSE) (scopus), 13(2):477- 488. DOI : 10.21817/indjcse/2022/v13i2/221302144, 2022
6 "Defensive Walls for Detecting and Preventing SQL Injection and XSS attacks in Dynamic Content Delivery Network Web Applications" Design Engineering (scopus), 2021(7):10019- 10039, 2021
7 "Getting Down to Brass Tacks of Prevention Mechanism of Sql Injection in Php based Web Application" International Journal of Electronics Communication and Computer Engineering, 8(6):324-328, 2017
8 “Diversify Based On the Context of the Word Queries for Xml Data” International Journal of Research IJR Volume 03 Issue 14 October 2016.
9 “P2P Sharing Cluster Proximity Interest-Aware File System” IJR International Journal of Research Volume 03 Issue 14, 2016.
10 “Flexible and Secure Key Exchange Mechanism for Network File Systems” International Journal of Research in Information Technology(IJRIT), Volume4, Issue 10, October 2016, pp.55-65.
11 “Enhanced QoS Based Collaborative Filtering for Web Service Recommender System" International Journal of Research in Information Technology(IJRIT), Volume 4, Issue 10, October 2016, pp. 66-76.
12 “The Strong Confidence: The Process of Computational Dynamic Trust Model for Secure Communication in Multi-Agent Systems” International Journal of Research Volume 03 Issue 14 October 2016.
13 “Cloud Privilege of Access to Data and Anonymity with the Unknown Entirely Based Encryption to Control Characteristics” International Journal of Research Volume 03 Issue 14 October 2016.
14 "A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration" Cybernetics and Information Technologies (ESCI), vol.13, no.3, 2013, pp.50-63. https://doi.org/10.2478/cait-2013-0025
15 “A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher” International Journal of Networks and Mobile Technologies, 2(1): pp 35-43, January, 2011.
16 “A Generalized Playfair Cipher involving Intertwining, interweaving and Iteration” International Journal of Networks and Mobile Technology, 1(2): 45-53, November, 2010.
17 “A Modified Hill Cipher involving Interweaving and Iteration” International Journal of Network Security (scopus), 11(2): 51-56, September 2010.
18 “A Modified Playfair Cipher Involving Interweaving and Iteration” International Journal of Computer Theory and Engineering (UGC CARE), 1(5): 594-598, December, 2009.
19 “A Modified Playfair Cipher for a Large Block of Plaintext” International Journal of Computer Theory and Engineering (UGC CARE), 1(5): 590-594, December, 2009.
20 “Modified Hill Cipher for a large block of plaintext with Interlacing and Iteration” Journal of Computer Science, Science Publications (scopus), 4(1):15-20, 2008.
21 “Modified Hill Cipher with Interlacing and Iteration” Journal of Computer Science, Science Publications (scopus), 3(11):854-859, 2007.
22 “A Large Block Cipher involving Interweaving and Iteration” proceedings of the International Conference on Advances and Emerging Trends in Computing Technologies (ICAET10)” June 21-24, 2010, Chennai pp: 328-333.
23 “An Improved and Scalable Digital Image Encryption Method Based on One-Dimensional Random Scrambling” “International Conference on Diversifying trends in Technology and Management”, April 6-7, 2013, NewDelhi pp:13-17.
24 Cryptanalysis of Modified Caesar Cipher using Rectangular Method for Enhanced Security - A Chosen Plaintext Attack Proceedings of International Conference on Science, Technology, Engineering and Management, 2017.
25 "Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack" Progress in Computing, Analytics and Networking (Proceedings of ICCAN 2019),Advances in Intelligent Systems and Computing Springer, Volume: 1119, pp: 475-482.
26 "Cryptanalysis of Modification in Hill Cipher for Cryptographic Application" (Advances in Machine Learning and Computational Intelligence 2020), Algorithms for Intelligent Systems Springer, Volume:16171, pp: 659-666.
27 "Enhanced Scrambled Prime Key Encryption Using Chaos Theory and Steganography", "Intelligent Data Communication Technologies and Internet of Things (ICICI 2019)" Springer Lecture Notes on Data Engineering and Communications Technologies, Volume: 38, pp: 104-113.
28 stream Cipher of alphabet using linear congruences National Conference, SNIST, Hyderabad, Nov 21-22, 2005.
29 “A Modified Playfair Cipher with Multiple Key Dependent Substitution Boxes and Chained Substitution” National Conference NCIS 2010 held on 23rd & 24th April 2010 at Manipal Center for Information Science, Manipal University, Manipal