Biography



Prof. Tushar Kanti Saha,

Computer Science and Engineering (CSE)

Jatiya Kabi Kazi Nazrul Islam University, Bangladesh

Accociate Professor


Email: tusharcsebd@gmail.com, tushar@jkkniu.edu.bd


Qualifications

2018 Ph.D., Saitama University, Japan

2004 M.Sc., DIslamic University, Kushtia, Bangladesh

2003 B.Sc., DIslamic University, Kushtia, Bangladesh


Publications (Selected)

  1. Tushar Kanti Saha, Mayank Rathee, and Takeshi Koshiba, Efficient private database queries using ring-LWE somewhat homomorphic encryption, Journal of information security and application, vol. 49, pp. 102406, (2019). doi: 10.1016/j.jisa.2019.102406
  2. Tushar Kanti Saha, and Takeshi Koshiba, Outsourcing private equality test to the cloud, Journal of information security and application, vol. 43, pp. 83-98, (2018). doi: 10.1016/j.jisa.2018.09.002
  3. Tushar Kanti Saha, Mayank, Deevashwer, and Takeshi Koshiba, Private comparison protocol and its application to range queries, In: Proceedings of the 20th International Conference on Internet and Distributed Computing System, IDCS 2017, Lecture Notes on Computer Science, vol. 10794, pp. 128-141, Springer (2017). doi: 10.1007/978-3-319-97795-9_12
  4. Tushar Kanti Saha and Takeshi Koshiba, Private equality test towards big data, In: Proceedings of the 20th International Conference on Foundation and Practice on Security, FPS 2017, Lecture Notes on Computer Science, vol. 10723, pp. 95-110, Springer (2018). doi: 10.1007/978-3-319-75650-9_7
  5. Tushar Kanti Saha and Takeshi Koshiba, An efficient privacy-preserving comparison protocol, in Proceedings of the 20th International Conference on Network-Based Information Systems, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies, vol. 7, pp. 553-565, Springer, Cham (2017). doi: 10.1007/978-3-319-65521-5_48
  6. Tushar Kanti Saha, Mayank, and Takeshi Koshiba, Efficient protocols for private database queries. In: Livraga G., Zhu S. (eds) Data and Applications Security and Privacy XXXI. DBSec 2017. Lecture Notes in Computer Science, vol. 10359. Springer (2017). doi: 10.1007/978-3-319-61176-1_19
  7. Tushar Kanti Saha and Takeshi Koshiba, Private conjunctive query over encrypted data. In: M. Joye and A. Nitaj (eds.) Progress in Cryptology - AFRICACRYPT 2017, LNCS 10239, pp. 149-164, Springer (2017). doi: 10.1007/978-3-319-57339-7_9
  8. Tushar Kanti Saha and Takeshi Koshiba, Private Equality Test using Ring-LWE Somewhat Homomorphic Encryption, In Proceedings of the 3rd Asia-Pacific World Congress on Computer Science and Engineering, APWConCSE, IEEE (2016). doi. 10.1109/APWC-on-CSE.2016.013
  9. Tushar Kanti Saha and Takeshi Koshiba, An Enhancement of Privacy-Preserving Wildcards Pattern Matching. In: Cuppens F., Wang L., Cuppens-Boulahia N., Tawbi N., Garcia-Alfaro J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science, vol. 10128. Springer, Cham (2016). doi: 10.1007/978-3-319- 51966-1_10
  10. Tushar Kanti Saha, Md. Saiful Islam, and A.B.M. Shawkat Ali, “Novel Algorithms for Detecting Bipartite and Complete Bipartite Graph” International Journal of Applied Research on Information Technology and Computing, vol.7(2), pp. 71-79, (2016). doi: 10.5958/0975-8089.2016.00007.5
  11. Tushar Kanti Saha and A.B.M. Shawkat Ali, “D2i2D: A novel secure approach for cloud storage with cost minimization”. Journal of Software, vol. 11(8), pp. 787-802, (2016). doi: 10.17706/jsw.11.8.787-802
  12. Tushar Kanti Saha and Md. Saiful Islam, “SIAM - A Proposed Model to Improve the Performance of Software Professionals”, Journal of Computing Technologies, vol.4(2), pp.143-147, (2015).
  13. Md. Saiful Islam and Tushar Kanti Saha, “A Novel Approach for Redemption of Trapezoidal Rule”, Journal of Computing Technologies, vol.4(2), pp-137-142, (2015).
  14. Tushar Kanti Saha and A.B.M. Shawkat Ali, Storage Cost Minimizing in Cloud – A Proposed Novel Approach Based on Multiple Key Cryptography. IEEE Asia-Pacific World Congress on Computer Science and Engineering 2014, IEEE, (2014). doi: 10.1109/APWCCSE.2014.7053856
  15. Tushar Kanti Saha and A.B.M. Shawkat Ali, Web Application Security Attacks and Countermeasures, Case Studies in Secure Computing – Achievements and Trends, Taylor and Francis Group, CRC Press, pp. 343-371, (2014). doi:10.1201/b17352
  16. Tushar Kanti Saha and A.B.M. Shawkat Ali, “Domain Specific Custom Search for Quicker Information Retrieval”. International Journal of Information Retrieval Research, 3(3), pp. 26-39, 2013. doi: 10.4018/ijirr.2013070102
  17. Tushar Kanti Saha and Ahsan-Ul-Ambia, “Code Generation Tools for Automated Server-side HTML form Validation”, International Journal of Computer Science and Management Research (IJCSMR), vol. 2(1), pp. 22-25 (2013).
  18. Tushar Kanti Saha and Ahsan-Ul-Ambia, “Mining the Web in Bengali Language: Opportunities and Future”, Journal of Computing Technologies, vol.1(8), pp. 22-25. (2012).
  19. Tushar Kanti Saha, "Automated Server-side Form Validation", In Proceedings of International Conference on Informatics, Electronics and Vision (ICIEV 2012), Dhaka, Bangladesh, pp. 55, (2012).
  20. Md. Mijanur Rahman, Tushar Kanti Saha, and Md. Al-Amin Bhuiyan, “Implementation of RSA algorithm for Speech Data Encryption and Decryption”, International Journal of Multidisciplinary Research and Advances in Engineering, vol.4(3), pp. 337-351 (2012).
  21. Tushar Kani Saha, Md. Mijnaur Rahman, and Md. Farukuzzaman Khan, “Peak Based Clustering of Continuous Bengali Speech for Medium Vocabulary Speech Recognition System”, International Journal of Applied Research on Information Technology and Computing, vol.2(3), pp. 30-40, (2011) doi: 10.5958/j.0975- 8070.2.3.018





Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top