Anish Mathuria joined the DA-IICT faculty as Associate Professor in 2003, and was promoted to
Professor in 2008. From 2000 to 2002, he was an Assistant Professor in
Computer and Information Sciences
at the University of Massachusetts, Dartmouth, USA.
He received the Ph.D. and MS (Honors) degrees in Computer Science from
the University of Wollongong,
Australia, and a BE in Electronics Engineering from the University of Bombay.
Between 1997 and 1999, he worked
at the IBM Tokyo Research Laboratory as a Postdoctoral Researcher and
Anish is co-author, with Colin Boyd, of the book
Protocols for Authentication and Key Establishment, published by Springer.
Selected Professional Service
I'm a member of ACM and IEEE, and a life member of the Cryptology Research
Society of India.
I have served on the following conference committees:
I have served on the DeitY committee for e-Authentication standards constituted by the Ministry of Communications and Information Technology, Govt. of India.
Referee for over 12 journals including Information Processing Letters, Computers & Security, Information Sciences, IEEE TIFS, IET Information Security, and Sadhana.
Grant reviewer for the Swiss National Science Foundation (2015).
PhD Thesis External Examiner, IIT Guwahati (2012).
A list of my publications can be found here.
My author pages on Google Scholar
I received the 1997 Australian Computer Science Association Best Paper Award for the paper
"Causality, partial orders, and lower bounds on rounds for a class of authentication protocols".
I am currently involved as co-PI (Indian side) in the Indo-French project,
"Study of Privacy, Accountability and Ownership in IoT".
I was PI (Indian side) of a project supported by DST and JST under
India-Japan cooperative program.
I have taught a variety of courses including
Systems Software, Data Structures, Security Protocols, System and Network Security, and Introduction to Cryptography.
I currently supervise the following postgraduate students:
Naveen Kumar (PhD student), on a project about secure data outsourcing in cloud.
B.Tech internship/project students (from 2015 onwards)
Harshil Sukhadia (RI), on a project about private set intersection protocols.
Akshar Varma (RI), on a project about automated cryptanalysis of classical ciphers.
Miti Mazmudar (BTP), on a project about software fuzzing.
Madhav Khakhar (BTP), on a project about DoS attack detection.
Past Postgraduate Students
Arohi Patel, Automatic Compact Alphanumeric Encoding of Shellcode, 2016.
Sunil Arora, Multipath Veritification Defense against SSL Stripping Attack,
Bhupendra Rajput, Improved Authenticated Packet Marking for IP traceback,
Anshu Yadav, Modelling and Detecting Attacks Against Key Agreement Protocols,
Shefali Jain, Enhancement of Misbehavior Detection Scheme for Vehicular Ad-hoc Metworks, 2012.
Shaik Basha, Improvement of RAD Technique for Detecting Reflector based DoS Attack, 2012.
Anil Mundra, A Prolog based Approach to Reasoning about Dynamic Hierarchical Key Assignment Schemes, 2011.
Ankit Sethi, Performance Evaluation of Kerberos Cross-realm Authentication using Simnet, 2011.
Shraddha Soni, Formal Analysis of Two Standardized Protocols Using Strand Spaces, 2008.
Tejaskumar Shah, Improvement of Tagged Architecture for Preventing Software Vulnerabilities, 2008.
Jai Gahlot, Security Analysis of Two Fair Exchange Protocols,
Praveen Vadnala, Secure and efficient key assignment scheme for dynamic access control, 2006.
Abhay Jain, Protecting Structures on Heap from Buffer Overflow Vulnerabilities with TIED - LibsafePlus, 2005.
Ekata Mandot, Traitor Tracing for XML Documents, 2005.
Pooja Kamra, ACIDS: Automated Co-stimulation based Intrusion detectiong system with a sense of Dynamic self, 2005.
Shivani Agrawal, "An improved algorithm for modular multiplication and its application to block cipher RC6", 2004.
Nirav Panchal,"Protecting mobile agents against malicious hosts using trusted computing", 2004.
Rajul Jain, "Contributions to Parasitic Computing", 2004.
Dheeraj Tandon, Covert communication in TCP/IP network, 2003.
Pawan Jadia, "Energy Efficient Secret Aggregation in Wireless Sensor Networks",