Call us : 09032-56212

শুভ মুজিব শতবর্ষ

Alternative Text

Dr. Tushar Kanti Saha

Present Designation
Associate Professor
Department
Computer Science and Engineering
Shared Resources
See Course Materials
Publications
See All

Area of Interest

Information and Cyber Security, Cloud Computing, Post-quantum Cryptography, Homomorphic Encryption, Privacy-preserving Techniques, Data Mining and Machine Learning.

Biography

Tushar K. Saha was born in Rajbari on 28 November 1981 in Bangladesh. He received his Ph.D. degree from Saitama University, Japan in 2018 and B.Sc. and M.Sc. in Computer Science and Engineering from Islamic University, Kushtia, Bangladesh in 2003 and 2004 respectively.
He is currently working as an Associate professor at the Department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University, Trishal, Mymensingh, Bangladesh. His research interest includes ICT, Cryptography, information security, Cloud computing, Data mining, and Machine learning. He has more than fifteen international journal publications. He has also published more than ten conference papers which were presented in national and international venues.
Dr. Saha got MEXT scholarship from Ministry of Education, Culture, Sports, Science and Technology (MEXT) of Japan for his PhD. He is serving as an editorial board member of Journal of Information Security (JIS), Scientific Research.
Publications:
Book Chapter:
Tushar Kanti Saha and A.B.M. Shawkat Ali, Web Application Security Attacks and Countermeasures, Case Studies in Secure Computing – Achievements and Trends, Taylor and Francis Group, CRC Press, pp. 343-371, (2014). doi:10.1201/b17352 (Book Chapter, ISBN 9781138034136)

Journals:
1. Tushar Kanti Saha and Takeshi Koshiba, Efficient Private Conjunctive Query Protocol Over Encrypted Data, Cryptography, vol. 5(2), pp. 2-29, MDPI (2021). doi: 10.3390/cryptography5010002 (cite score 3.1 scopous, Q2)
2. Abdul Muyeed, Tushar Kanti Saha, Rubya Shaharin, and Uzzal Kumar Prodhan, The Prevalence and Severity Comparison of COVID-19 Disease in SAARC Affiliated Countries: Pattern Analysis during the First Wave in 2020, Journal of Health & Biological Sciences, vol. 9(1), pp. 1-7, Instituto para o Desenvolvimento da Educacao, Brazil (2021). (DOAJ-indexed)
3. Uzzal Kumar Prodhan, Tushar Kanti Saha, Rubya Shaharin, Toufik Ahmed Emon and Mohammad Zahidur Rahman, Implementation of Low Cost Remote Primary Healthcare Services through Telemedicine: Bangladesh Perspectives, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 11(11), SAI (2020). doi: 10.14569/IJACSA.2020.0111118 (scopous-indexed)
4. Abdul Muyeed, Md Nure Alam Siddiqi, Tushar Kanti Saha, and Md Abdul Goni, Infection and Death Patterns of COVID-19 Disease in Bangladesh, Journal of Health & Biological Sciences, vol. 8(1), pp. 1-7, Instituto para o Desenvolvimento da Educacao, Brazil (2020). (DOAJ-indexed)
5. Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba, Efficient Protocols for Private Wildcards Pattern Matching, Journal of Information Security and Applications, vol. 55, pp. 102609, Springer (2020). doi: 10.1016/j.jisa.2020.102609 (Impact Factor: 2.327, Q2)
6. Tushar Kanti Saha, Mayank Rathee, and Takeshi Koshiba, Efficient private database queries using ring-LWE somewhat homomorphic encryption, Journal of information security and application, vol. 49, pp. 102406, Springer (2019). doi: 10.1016/j.jisa.2019.102406 (Impact Factor: 2.327, Q2)
7. Tushar Kanti Saha and Takeshi Koshiba, Outsourcing private equality test to the cloud, Journal of information security and application, vol. 43, pp. 83-98, Springer (2018). doi: 10.1016/j.jisa.2018.09.002 (Impact Factor: 2.327, Q2)
8. Tushar Kanti Saha, Md. Saiful Islam, and A.B.M. Shawkat Ali, Novel Algorithms for Detecting Bipartite and Complete Bipartite Graph, International Journal of Applied Research on Information Technology and Computing, vol. 7(2), pp. 71-79, Indianjournals (2016). doi: 10.5958/0975-8089.2016.00007.5
9. Tushar Kanti Saha and A.B.M. Shawkat Ali, D2i2D: A novel secure approach for cloud storage with cost minimization, Journal of Software, vol. 11(8), pp. 787-802, International Academy Publishing (2016). doi: 10.17706/jsw.11.8.787-802
10. Tushar Kanti Saha and Md. Saiful Islam, SIAM – A Proposed Model to Improve the Performance of Software Professionals, Journal of Computing Technologies, vol.4(2), pp.143-147, JCTjournals (2015).
11. Md. Saiful Islam and Tushar Kanti Saha, A Novel Approach for Redemption of Trapezoidal Rule, Journal of Computing Technologies, vol. 4(2), pp-137-142, JCTjournals (2015).
12. Tushar Kanti Saha and A.B.M. Shawkat Ali, Domain Specific Custom Search for Quicker Information Retrieval, International Journal of Information Retrieval Research, vol. 3(3), pp. 26-39, IGI-Global (2013). doi: 10.4018/ijirr.2013070102
13. Tushar Kanti Saha and Ahsan-Ul-Ambia, Code Generation Tools for Automated Server-side HTML form Validation, International Journal of Computer Science and Management Research (IJCSMR), vol. 2(1), pp. 22-25, IJCSMR (2013).
14. Tushar Kanti Saha and Ahsan-Ul-Ambia, Mining the Web in Bengali Language: Opportunities and Future, Journal of Computing Technologies, vol.1(8), pp. 22-25, JCTjournals (2012).
15. Md. Mijanur Rahman, Tushar Kanti Saha, and Md. Al-Amin Bhuiyan, Implementation of RSA algorithm for Speech Data Encryption and Decryption, International Journal of Multidisciplinary Research and Advances in Engineering, vol. 4(3), pp. 337-351, Ascent Publication, India (2012).
16. Tushar Kanti Saha, Md. Mijnaur Rahman, and Md. Farukuzzaman Khan, Peak Based Clustering of Continuous Bengali Speech for Medium Vocabulary Speech Recognition System, International Journal of Applied Research on Information Technology and Computing, vol. 2(3), pp. 30-40, Indianjournals (2011). doi: 10.5958/j.0975-8070.2.3.018

Conference Papers Published as Book Chapters in Springer & Proceedings in IEEE
1. Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, and Shiho Moriai, Enhanced Secure Comparison Schemes Using Homomorphic Encryption. In: Barolli L., Li K., Enokido T., Takizawa M. (eds) Advances in Networked-Based Information Systems. NBiS 2020. Advances in Intelligent Systems and Computing, vol 1264. Springer (2020). doi: 10.1007/978-3-030-57811-4_20
2. Tushar Kanti Saha, Mayank, Deevashwer, and Takeshi Koshiba, Private comparison protocol and its application to range queries, In: Proceedings of the 20th International Conference on Internet and Distributed Computing System, IDCS 2017, Lecture Notes on Computer Science, vol. 10794, pp. 128-141, Springer (2017). doi: 10.1007/978-3-319-97795-9_12 (H-INDEX 400, Q3)
3. Tushar Kanti Saha and Takeshi Koshiba, Private equality test towards big data, In: Proceedings of the 20th International Conference on Foundation and Practice on Security, FPS 2017, Lecture Notes on Computer Science, vol. 10723, pp. 95-110, Springer (2018). doi: 10.1007/978-3-319-75650-9_7 (H-INDEX 400, Q3)
4. Tushar Kanti Saha and Takeshi Koshiba, An efficient privacy-preserving comparison protocol, In: Proceedings of the 20th International Conference on Network-Based Information Systems, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies, vol. 7, pp. 553-565, Springer, Cham (2017). doi: 10.1007/978-3-319-65521-5_48
5. Tushar Kanti Saha, Mayank, and Takeshi Koshiba, Efficient protocols for private database queries. In: Livraga G., Zhu S. (eds) Data and Applications Security and Privacy XXXI. DBSec 2017. Lecture Notes in Computer Science, vol. 10359. Springer (2017). doi: 10.1007/978-3-319-61176-1_19 (H-INDEX 400, Q3)
6. Tushar Kanti Saha and Takeshi Koshiba, Private conjunctive query over encrypted data. In: M. Joye and A. Nitaj (eds.) Progress in Cryptology – AFRICACRYPT 2017, Lecture Notes in Computer Science, vol. 10239, pp. 149-164, Springer (2017). doi: 10.1007/978-3-319-57339-7_9 (H-INDEX 400, Q3)
7. Santa Maria Shithil, Tushar Kanti Saha, and Tonusree Sharma, A dynamic data placement policy for heterogeneous Hadoop cluster, In: 4th International Conference on Advances in Electrical Engineering (ICAEE), 2017, pp. 302-307, doi: 10.1109/ICAEE.2017.8255371.
8. Tushar Kanti Saha and Takeshi Koshiba, Private Equality Test using Ring-LWE Somewhat Homomorphic Encryption, In: Proceedings of the 3rd Asia-Pacific World Congress on Computer Science and Engineering, APWConCSE, IEEE (2016). doi. 10.1109/APWC-on-CSE.2016.013
9. Tushar Kanti Saha and Takeshi Koshiba, An Enhancement of Privacy-Preserving Wildcards Pattern Matching. In: Cuppens F., Wang L., Cuppens-Boulahia N., Tawbi N., Garcia-Alfaro J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science, vol. 10128. Springer, Cham (2016). doi: 10.1007/978-3-319-51966-1_10 (H-INDEX 400, Q3)

10. Tushar Kanti Saha and A.B.M. Shawkat Ali, Storage Cost Minimizing in Cloud – A Proposed Novel Approach Based on Multiple Key Cryptography. In: IEEE Asia-Pacific World Congress on Computer Science and Engineering 2014, IEEE, (2014). doi: 10.1109/APWCCSE.2014.7053856
11. Tushar Kanti Saha, “Automated Server-side Form Validation”, In: Proceedings of International Conference on Informatics, Electronics and Vision (ICIEV 2012), Dhaka, Bangladesh, pp. 55, IEEE (2012).

Email: tusharcsebd@gmail.com

Personal Website/Blog