Call us : 09032-56212

শুভ মুজিব শতবর্ষ

দিন
ঘণ্টা
মিনিট
সেকেন্ড
Alternative Text

DR. TUSHAR KANTI SAHA

Present Designation
Associate Professor & Head of the Department
Department
Statistics
Shared Resources
See Course Materials
Publications
See All

Area of Interest

Information and Cyber Security, Cloud Computing, Post-quantum Cryptography, Homomorphic Encryption, Privacy-preserving Techniques, Data Mining and Machine Learning

Biography

1.      Tushar Kanti Saha, Mayank Rathee, and Takeshi Koshiba, Efficient private database queries using ring-LWE somewhat homomorphic encryption, Journal of information security and application, vol. 49, pp. ????-????, (2019).

2.      Tushar Kanti Saha, and Takeshi Koshiba, Outsourcing private equality test to the cloud, Journal of information security and application, vol. 43, pp. 83-98, (2018).

3.      Tushar Kanti Saha, Mayank, Deevashwer, and Takeshi Koshiba, Private comparison protocol and its application to range queries, In: Proceedings of the 20th International Conference on Internet and Distributed Computing System, IDCS 2017, Lecture Notes on Computer Science, vol. 10794, pp. 128-141, Springer (2017).

4.      Tushar Kanti Saha and Takeshi Koshiba, Private equality test towards big data, In: Proceedings of the 20th International Conference on Foundation and Practice on Security, FPS 2017, Lecture Notes on Computer Science, vol. 10723, pp. 95-110, Springer (2018).

5.      Tushar Kanti Saha and Takeshi Koshiba, An efficient privacy-preserving comparison protocol, in Proceedings of the 20th International Conference on Network-Based Information Systems, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies, vol. 7, pp. 553-565, Springer, Cham (2017).

6.      Tushar Kanti Saha, Mayank, and Takeshi Koshiba, Efficient protocols for private database queries. In: Livraga G., Zhu S. (eds) Data and Applications Security and Privacy XXXI. DBSec 2017. Lecture Notes in Computer Science, vol. 10359. Springer (2017). doi: 10.1007/978-3-319-61176-1_19

7.      Tushar Kanti Saha and Takeshi Koshiba, Private conjunctive query over encrypted data. In: M. Joye and A. Nitaj (eds.) Progress in Cryptology – AFRICACRYPT 2017, LNCS 10239, pp. 149-164, Springer (2017). doi: 10.1007/978-3-319-57339-7_9

8.      Tushar Kanti Saha and Takeshi Koshiba, Private Equality Test using Ring-LWE Somewhat Homomorphic Encryption, In Proceedings of the 3rd Asia-Pacific World Congress on Computer Science and Engineering, APWConCSE, IEEE (2016). doi. 10.1109/APWC-on-CSE.2016.013

9.      Tushar Kanti Saha and Takeshi Koshiba, An Enhancement of Privacy-Preserving Wildcards Pattern Matching. In: Cuppens F., Wang L., Cuppens-Boulahia N., Tawbi N., Garcia-Alfaro J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science, vol. 10128. Springer, Cham (2016). doi: 10.1007/978-3-319-51966-1_10

10.  Tushar Kanti Saha, Md. Saiful Islam and A.B.M. Shawkat Ali, “Novel Algorithms for Detecting Bipartite and Complete Bipartite GraphInternational Journal of Applied Research on Information Technology and Computing, vol.7(2), pp. 71-79, (2016).

11.  Tushar Kanti Saha and A.B.M. Shawkat Ali, “D2i2D: A novel secure approach for cloud storage with cost minimization”. Journal of Software, vol. 11(8), pp. 787-802, (2016).

12.  Tushar Kanti Saha and Md. Saiful Islam, “SIAM – A Proposed Model to Improve the Performance of Software Professionals”, Journal of Computing Technologies, vol.4(2), pp.143-147, (2015).

13.  Md. Saiful Islam and Tushar Kanti Saha, “A Novel Approach for Redemption of Trapezoidal Rule”, Journal of Computing Technologies, vol.4(2), pp-137-142, (2015).

14.  Tushar Kanti Saha and A.B.M. Shawkat Ali, Storage Cost Minimizing in Cloud – A Proposed Novel Approach Based on Multiple Key Cryptography. IEEE Asia-Pacific World Congress on Computer Science and Engineering 2014, IEEE, (2014).

15.  Tushar Kanti Saha and A.B.M. Shawkat Ali, Web Application Security Attacks and Countermeasures, Case Studies in Secure Computing – Achievements and Trends, Taylor and Francis Group, CRC Press, pp. 343-371, (2014).

16.  Tushar Kanti Saha and A.B.M. Shawkat Ali, “Domain Specific Custom Search for Quicker Information Retrieval”. International Journal of Information Retrieval Research, 3(3), pp. 26-39, 2013. DOI: 10.4018/ijirr.2013070102       

17.  Tushar Kanti Saha and Ahsan-Ul-Ambia, “Code Generation Tools for Automated Server-side HTML form Validation”, International Journal of Computer Science and Management Research (IJCSMR), vol. 2(1), pp. 22-25 (2013)

18.  Tushar Kanti Saha and Ahsan-Ul-Ambia, “Mining the Web in Bengali Language: Opportunities and Future”, Journal of Computing Technologies, vol.1(8), pp. 22-25. (2012)

19.  Tushar Kanti Saha, “Automated Server-side Form Validation“, In Proceedings of International Conference on Informatics, Electronics and Vision (ICIEV 2012), Dhaka, Bangladesh, pp. 55, (2012).

20.  Md. Mijanur Rahman, Tushar Kanti Saha and Md. Al-Amin Bhuiyan, “Implementation of RSA algorithm for Speech Data Encryption and Decryption”, International Journal of Multidisciplinary Research and Advances in Engineering, vol.4(3), pp. 337-351 (2012)

21.  Tushar Kani Saha, Md. Mijnaur Rahman and Md. Farukuzzaman Khan, “Peak Based Clustering of Continuous Bengali Speech for Medium Vocabulary Speech Recognition System”, International Journal of Applied Research on Information Technology and Computing, vol.2(3), pp. 30-40, (2011)

Email: tushar.k@jkkniu.edu.bd

Personal Website/Blog