Deepak B. Phatak
Indian Institute of Technology Bombay
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Deepak B. Phatak.
Computers & Security | 2006
Manik Lal Das; Ashutosh Saxena; Ved Prakash Gulati; Deepak B. Phatak
The paper presents a remote user authentication scheme using the properties of bilinear pairings. In the scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.
Operating Systems Review | 2005
Manik Lal Das; Ashutosh Saxena; Ved Prakash Gulati; Deepak B. Phatak
We present a hierarchical key management scheme using cryptographic hash function and Newtons polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and security weakness. We show that our scheme is secure and efficient in comparisons to the Shen and Chens scheme.
information assurance and security | 2007
Satish Devane; Madhumita Chatterjee; Deepak B. Phatak
File carving is the process of recovering files from a disk without the help of a file system. In forensics, it is a helpful tool in finding hidden or recently removed disk content. Known signatures in file headers and footers are especially useful in carving such files out, that is, from header until footer. However, this approach assumes that file clusters remain in order. In case of file fragmentation, file clusters can be disconnected and the order can even be disrupted such that straighforward carving will fail. In this paper, we focus on methods for classifying clusters into file types by using the statistics of the clusters. By not exploiting the possible embedded signatures, we generate evidence from a different source that can be integrated later on. We propose a set of characteristic features and use statistical pattern recognition to learn a supervised classification model for a range of relevant file types. We exploit the statistics of a restricted number of neighboring clusters (context) to improve classification performance. In the experiments we show that the proposed features indeed enable the differentation of clusters into file types. Moreover, for some file types the incorporation of cluster context improves the recognition performance significantly.The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.
frontiers in education conference | 2008
Kannan M. Moudgalya; Deepak B. Phatak; R. K. Shevgaonkar
Distance education at IIT Bombay is carried out through live and free transmission of its own courses, through satellite, video conference and webcast. Distance education is a partial solution to improve the dismal state of engineering education in India. Optionally, the transmission is also available under value added modes, using powerful features, such as, video course on demand and the learning management system, moodle. A brief description of the nonthesis masterpsilas degree, known as postgraduate diploma of IIT Bombay, PGDIIT, available through the distance mode, is given. The article concludes with a summary of the national programme on technology enhanced learning, NPTEL, a joint effort of all IITs and IISc. The students, staff and faculty of IIT Bombay enthusiastically support distance education.
vehicular technology conference | 2004
Debabrata Nayak; N. Rajendran; Deepak B. Phatak; Ved Prakash Gulati
The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. The demand for such applications is currently experiencing a significant increase, and therefore, there is a strong call for advanced and efficient security mechanisms for mobile data network technologies. This paper deals with these mobile data security technologies and aims to exhibit their potential for integrity, availability and confidentiality. It provides a thorough analysis of the most important mobile packet data services and technologies, which can reveal the data in a secure manner. The article outlines its main technical characteristics, discusses its architectural aspects, based on security, and explains the access protocol and the services provided, in a secured way. This paper deals with security techniques for mobile data networks.
Archive | 2015
Deepak B. Phatak
In India, over 5,000 engineering colleges affiliated to different universities offer conventional engineering education. Teachers in colleges do the teaching, but universities rigidly control the programme of study, syllabus, and examinations. The quality of education is a matter of concern. MOOCs (Massive Open Online Courses) permit learners to access and benefit from the teaching by renowned professors. MOOCs offer an unprecedented opportunity to revitalise education. These cause complete disintermediation of the university system, making them very affordable; however, they have several shortcomings in their present form. Students enrolling for a MOOC still have to conventionally study the subject for their degree. Complete absence of physical group activities in a classroom under a teacher’s mentoring is another serious issue. Conduct of practical sessions in laboratories is an important aspect of engineering education, for which MOOCs offer no alternative.
information security practice and experience | 2005
Debabrata Nayak; Deepak B. Phatak; Ved Prakash Gulati
In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users. General Terms: Mobile security, Wireless privacy, And port based Access point.
electronic commerce and web technologies | 2009
Satish Devane; Deepak B. Phatak
Common Electronic Purse Specification (CEPS) used by European countries, elaborately defines the transaction between customers CEP card and merchants point of sales (POS) terminal. However it merely defines the specification to transfer the transactions between the Merchant and Merchant Acquirer (MA). This paper proposes a novel approach by introducing an entity, mobile merchant acquirer (MMA) which is a trusted agent of MA and principally works on man in middle concept, but facilitates remote two fold mutual authentication and secure transaction transfer between Merchant and MA through MMA. This approach removes the bottle-neck of connectivity issues between Merchant and MA in limited connectivity environment. The proposed protocol ensures the confidentiality, integrity and money atomicity of transaction batch. The proposed protocol has been verified for correctness by Spin, a model checker and security properties of the protocol have been verified by avispa.
ieee sarnoff symposium | 2005
Debabrata Nayak; Deepak B. Phatak; Ved Prakash Gulati
In this paper, we investigated existing and proposed WLAN security technologies designed to improve the IEEE 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying the security policy to an individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when policy index changes causing drastic degradation of system performance. In this paper, we present a detailed study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and IEEE 801.1X. Furthermore, we analyze the effectiveness of such solutions, based on measurement of policy indexing model implementation. Performance measurement indicates that the 802.1X and VPN policy based method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users
International Journal of Network Security | 2009
Manik Lal Das; Ashutosh Saxena; Deepak B. Phatak
Collaboration
Dive into the Deepak B. Phatak's collaboration.
Institute for Development and Research in Banking Technology
View shared research outputsInstitute for Development and Research in Banking Technology
View shared research outputs