Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rohit Pathak is active.

Publication


Featured researches published by Rohit Pathak.


international conference on contemporary computing | 2009

Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup

Rohit Pathak; Satyadhar Joshi

In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the analysis of Nano RFID (Radio Frequency Identification) systems. We have shown the modeling and simulation and demonstrated some novel ideas and library development for Nano RFID. Multi scale modeling plays a very important role in nanotech enabled devices properties of which cannot be explained sometimes by abstraction level theories. Reliability and packaging still remains one the major hindrances in practical implementation of Nano RFID based devices. And to work on them modeling and simulation will play a very important role. CNTs is the future low power material that will replace CMOS and its integration with CMOS, MEMS circuitry will play an important role in realizing the true power in Nano RFID systems. RFID based on innovations in nanotechnology has been shown. MEMS modeling of Antenna, sensors and its integration in the circuitry has been shown. Thus incorporating this we can design a Nano-RFID which can be used in areas like human implantation and complex banking applications. We have proposed modeling of RFID using the concept of multi scale modeling to accurately predict its properties. Also we give the modeling of MEMS devices that are proposed recently that can see possible application in RFID. We have also covered the applications and the advantages of Nano RFID in various areas. RF MEMS has been matured and its devices are being successfully commercialized but taking it to limits of nano domains and integration with singly chip RFID needs a novel approach which is being proposed. We have modeled MEMS based transponder and shown the distribution for multi scale modeling for Nano RFID.


information security and assurance | 2009

Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data

Rohit Pathak; Satyadhar Joshi

In this paper, we propose a new Virtual Party Protocol (VPP) protocol for Secure Multi-Party Computation (SMC). There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new protocol to perform computation on encrypted data. The data is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis and have also shown how we can achieve zero hacking security with proper configuration.


2009 Innovative Technologies in Intelligent Systems and Industrial Applications | 2009

Multi Scale modeling and intricate study of MEMS based elements in RFID systems

Rohit Pathak; Satyadhar Joshi; Pawan Kotak

In this paper we have implemented some of the complex modeling aspects such as Multi Scale modeling, MATLAB, Sugar based modeling and have shown the complexities involved in the device modeling of Nano RFID systems taking example of MEMS models. We have shown the modeling and simulation and demonstrated some novel ideas and library development for Nano RFID and its extension for MEMS devices. Reliability and packaging still remains one the major hindrances in practical implementation of Nano RFID based devices and multi scale analysis also can be used in that area. Therefore to work on it by modeling and simulation will play a very important role. Thus incorporating this we can design a Nano-RFID which can be used in areas like human implantation and complex banking applications. We have proposed modeling of RFID using the concept of multi scale modeling to accurately predict its properties for MEMS specific applications. Also we give the modeling of MEMS devices that are proposed recently that can see possible application in RFID. RF MEMS has been matured and its devices are being successfully commercialized but taking it to limits of nano domains and integration with singly chip RFID needs a practical modeling approach which is being proposed. We have modeled 2 MEMS based transponder and shown the distribution for multiscale modeling for Nano RFID.


asian himalayas international conference on internet | 2009

Recent trends in RFID and a java based software framework for its integration in mobile phones

Rohit Pathak; Satyadhar Joshi

Radio Frequency Identification (RFID) is generic term for technologies employing radio waves for detecting objects. We describe our approach with recent methodologies in RFID systems sighting its commercial ventures as it is the most researched and rapidly emerging technologies. RFID has wide application in payment systems, access control and asset tracking as the companies are using the technologys potential in manufacturing and other areas. A proposed software framework for RFID integrated mobile phones with considerable changes in the system has been explained in the paper. Installation of the operating system with a driver to run RFID reader and involvement of Java Platform ME package for support in programming for RFID reader. A system service will continuously watch over the RFID hardware for events. Standalone application made in Java can use and control the reader. Exemplary future applications and systems based on RFID and other technologies integrated with RFID mobile phones are proposed in this paper. We have discussed about applications, problems being faced by such RFID systems & their limitations in other fields in the current era. The commercial scope in the field of RFID manufacturing and research has been discussed with its integration with current technologies. Some hardware and software limitations that restrict its feasibility in some fields like Mobile Phone based RFID technologies are discussed with some future enhancements in this area.


international conference on contemporary computing | 2009

Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

Rohit Pathak; Satyadhar Joshi

Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.


international conference on contemporary computing | 2009

Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

Rohit Pathak; Satyadhar Joshi

With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.


wireless and optical communications networks | 2010

Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network

Durgesh Kumar Mishra; Rohit Pathak; Satyadhar Joshi; Arpit Ludhiyani

A novel Secure Multi-party Computation protocol for statistical computations has been proposed and implemented in this work. The described protocol is an enhanced version of our previous proposal of virtual party protocol. Here the system is implemented using a Token Ring Network. Secure Multi-party Computation is classically defined as a system in which computation which involves data from a number of organizations, is performed. Since each organization want to hide its data from other parties, this type of computation requires special security measures. The paper also describes the application of the protocol for secure banking computations, secure business process out-sourcing computations, secure surveys and other intricate statistical computations.


international conference on electrical engineering/electronics, computer, telecommunications and information technology | 2009

Optimizing HPC and parallelization for computation Nanotechnology in MCCS environment

Rohit Pathak; Satyadhar Joshi; Salman Ahmed; Durgesh Mishr

The essence of High performance computing (HPC) in the field of Nanotechnology and problems encountered by HPC arrangement in applying HPC to Nano-enabled calculations have been presented in the paper. A proposal to optimize computations in an HPC setup and distribution of work in various clusters has been formulated to make Nanotechnology computations more effective and realistic on a Windows Cluster Server based framework. Results and findings in the expected setup and the computation complexities that will be needed in its implementation have been suggested with an algorithm to take advantage of inbuilt powerful parallelization and distribution capabilities of Windows Server 2003 Compute Cluster Edition making large scale simulation possible. Connection of four nodes with the help of Microsoft Compute Cluster Server 2003 (MCCS 2003) has been carried out and algorithms were constructed in C# using Visual Studio IDE. In addition to the .NET Framework, Extreme Optimization Numerical Library for .NET has been used for performing high speed mathematical calculations. MPI .NET library has been employed to build parallel algorithms and breaking of computations into small tasks. Microsofts implementation of Message Passing Interface (MPI) included in MCCS was used for running computation application tests. Implementation of HPC in measuring reliability of Nanotechnology-based devices and computations of certain complex techniques in Nanotechnology is presented with a significant improvement in performance as compared to the last work which was implemented using distributive computing toolbox in MATLAB. Besides its use in large-scale computations, C# also offers more control over programming, runtime and execution of the application. A description of the progress in this area of research, future works and an extended approach in the same field is shown.


asian himalayas international conference on internet | 2009

SMC protocol for privacy preserving in banking computations along with security analysis

Rohit Pathak; Satyadhar Joshi

The expansion of internet escalated banking to a new level and has raised tremendous opportunities of joint transactions in which multiple banks cooperatively conduct some computation. Such computations use confidential data of the involved banks to compute the result. As the concerned data is private for the owning organization, its security is prime concern. Privacy preservation concern rises as no party can be trusted enough to know all the inputs of computation. In this paper we have proposed a scalable and efficient protocol to perform secure multi-party computations on encrypted data. The process involves encrypting data in a manner that it does not affect the result of the computation. Virtual parties are created by all organizations and encrypted data is distributed among them. Modifier tokens are generated along encryption which are assigned to virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute result. As the data involved in computation was encrypted, without revealing the data right result can be computed and privacy of the parties is maintained. The protocol is highly efficient in conducting banking computations. We have analyzed the security and complexity of protocol and shown how zero hacking security can be achieved. Also we have analyzed the performance through various tests.


Proceedings of the International Conference on ICSTE 2009 | 2009

OPTIMIZING RELIABILITY ANALYSIS OF MEMS DEVICES ON AN HPC SETUP USING MULTI SCALE MODELING

Rohit Pathak; Satyadhar Joshi

ion Scale Properties Nano CMOS 30-100nm Capacitance in CMOS RF MEMS 100-500nm Properties of antenna CNT 10-30 nm Conductance Although these tools have been successful in simulating the behavior of simple-function devices but fails when it goes to more complex areas because the physics developed cannot explain accurately all the properties, also they have not been as successful in simulating the behavior of more complex systems on a personal computer (PC) nor within a practical amount of time. Software proves its utility in technological advancements in MEMS by facilitating the design process and reducing the time of computation. Some of the features are packaged in a CAE for MEMS tool called SUGAR [12] which has also been shoed in [22]. Mechanical modeling as from RF-MEMS prospective is given in [24] where MA (Nm) is the reaction moment at the left end, and RA (N) is the vertical reaction at the left end. The equations are:-

Collaboration


Dive into the Rohit Pathak's collaboration.

Top Co-Authors

Avatar

Satyadhar Joshi

Shri Vaishnav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Arpit Ludhiyani

Shri Vaishnav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Durgesh Kumar Mishra

Acropolis Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Salman Ahmed

Shri Vaishnav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Pawan Kotak

Acropolis Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Anil Jain

Shri Vaishnav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Durgesh Mishr

Acropolis Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge