Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Deepak B. Phatak is active.

Publication


Featured researches published by Deepak B. Phatak.


Computers & Security | 2006

A novel remote user authentication scheme using bilinear pairings

Manik Lal Das; Ashutosh Saxena; Ved Prakash Gulati; Deepak B. Phatak

The paper presents a remote user authentication scheme using the properties of bilinear pairings. In the scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.


Operating Systems Review | 2005

Hierarchical key management scheme using polynomial interpolation

Manik Lal Das; Ashutosh Saxena; Ved Prakash Gulati; Deepak B. Phatak

We present a hierarchical key management scheme using cryptographic hash function and Newtons polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and security weakness. We show that our scheme is secure and efficient in comparisons to the Shen and Chens scheme.


information assurance and security | 2007

Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Satish Devane; Madhumita Chatterjee; Deepak B. Phatak

File carving is the process of recovering files from a disk without the help of a file system. In forensics, it is a helpful tool in finding hidden or recently removed disk content. Known signatures in file headers and footers are especially useful in carving such files out, that is, from header until footer. However, this approach assumes that file clusters remain in order. In case of file fragmentation, file clusters can be disconnected and the order can even be disrupted such that straighforward carving will fail. In this paper, we focus on methods for classifying clusters into file types by using the statistics of the clusters. By not exploiting the possible embedded signatures, we generate evidence from a different source that can be integrated later on. We propose a set of characteristic features and use statistical pattern recognition to learn a supervised classification model for a range of relevant file types. We exploit the statistics of a restricted number of neighboring clusters (context) to improve classification performance. In the experiments we show that the proposed features indeed enable the differentation of clusters into file types. Moreover, for some file types the incorporation of cluster context improves the recognition performance significantly.The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.


frontiers in education conference | 2008

Engineering education for everyone a distance education experiment at IIT Bombay

Kannan M. Moudgalya; Deepak B. Phatak; R. K. Shevgaonkar

Distance education at IIT Bombay is carried out through live and free transmission of its own courses, through satellite, video conference and webcast. Distance education is a partial solution to improve the dismal state of engineering education in India. Optionally, the transmission is also available under value added modes, using powerful features, such as, video course on demand and the learning management system, moodle. A brief description of the nonthesis masterpsilas degree, known as postgraduate diploma of IIT Bombay, PGDIIT, available through the distance mode, is given. The article concludes with a summary of the national programme on technology enhanced learning, NPTEL, a joint effort of all IITs and IISc. The students, staff and faculty of IIT Bombay enthusiastically support distance education.


vehicular technology conference | 2004

Security issues in mobile data networks

Debabrata Nayak; N. Rajendran; Deepak B. Phatak; Ved Prakash Gulati

The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. The demand for such applications is currently experiencing a significant increase, and therefore, there is a strong call for advanced and efficient security mechanisms for mobile data network technologies. This paper deals with these mobile data security technologies and aims to exhibit their potential for integrity, availability and confidentiality. It provides a thorough analysis of the most important mobile packet data services and technologies, which can reveal the data in a secure manner. The article outlines its main technical characteristics, discusses its architectural aspects, based on security, and explains the access protocol and the services provided, in a secured way. This paper deals with security techniques for mobile data networks.


Archive | 2015

Adopting MOOCs for Quality Engineering Education in India

Deepak B. Phatak

In India, over 5,000 engineering colleges affiliated to different universities offer conventional engineering education. Teachers in colleges do the teaching, but universities rigidly control the programme of study, syllabus, and examinations. The quality of education is a matter of concern. MOOCs (Massive Open Online Courses) permit learners to access and benefit from the teaching by renowned professors. MOOCs offer an unprecedented opportunity to revitalise education. These cause complete disintermediation of the university system, making them very affordable; however, they have several shortcomings in their present form. Students enrolling for a MOOC still have to conventionally study the subject for their degree. Complete absence of physical group activities in a classroom under a teacher’s mentoring is another serious issue. Conduct of practical sessions in laboratories is an important aspect of engineering education, for which MOOCs offer no alternative.


information security practice and experience | 2005

Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach

Debabrata Nayak; Deepak B. Phatak; Ved Prakash Gulati

In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users. General Terms: Mobile security, Wireless privacy, And port based Access point.


electronic commerce and web technologies | 2009

Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment

Satish Devane; Deepak B. Phatak

Common Electronic Purse Specification (CEPS) used by European countries, elaborately defines the transaction between customers CEP card and merchants point of sales (POS) terminal. However it merely defines the specification to transfer the transactions between the Merchant and Merchant Acquirer (MA). This paper proposes a novel approach by introducing an entity, mobile merchant acquirer (MMA) which is a trusted agent of MA and principally works on man in middle concept, but facilitates remote two fold mutual authentication and secure transaction transfer between Merchant and MA through MMA. This approach removes the bottle-neck of connectivity issues between Merchant and MA in limited connectivity environment. The proposed protocol ensures the confidentiality, integrity and money atomicity of transaction batch. The proposed protocol has been verified for correctness by Spin, a model checker and security properties of the protocol have been verified by avispa.


ieee sarnoff symposium | 2005

Performance evaluation of security architecture for wireless local area networks by indexed based policy method

Debabrata Nayak; Deepak B. Phatak; Ved Prakash Gulati

In this paper, we investigated existing and proposed WLAN security technologies designed to improve the IEEE 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying the security policy to an individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when policy index changes causing drastic degradation of system performance. In this paper, we present a detailed study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and IEEE 801.1X. Furthermore, we analyze the effectiveness of such solutions, based on measurement of policy indexing model implementation. Performance measurement indicates that the 802.1X and VPN policy based method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users


International Journal of Network Security | 2009

Algorithms and Approaches of Proxy Signature: A Survey

Manik Lal Das; Ashutosh Saxena; Deepak B. Phatak

Collaboration


Dive into the Deepak B. Phatak's collaboration.

Top Co-Authors

Avatar

Ved Prakash Gulati

Institute for Development and Research in Banking Technology

View shared research outputs
Top Co-Authors

Avatar

Manik Lal Das

Indian Institute of Chemical Technology

View shared research outputs
Top Co-Authors

Avatar

Debabrata Nayak

Indian Institutes of Technology

View shared research outputs
Top Co-Authors

Avatar

N. Rajendran

Institute for Development and Research in Banking Technology

View shared research outputs
Top Co-Authors

Avatar

Satish Devane

Ramrao Adik Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kannan M. Moudgalya

Indian Institute of Technology Bombay

View shared research outputs
Top Co-Authors

Avatar

Madhumita Chatterjee

Ramrao Adik Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

R. K. Shevgaonkar

Indian Institute of Technology Bombay

View shared research outputs
Researchain Logo
Decentralizing Knowledge