Anish Mathuria joined the DA-IICT faculty as Associate Professor in 2003, and was promoted to
Professor in 2008. From 2000 to 2002, he was an Assistant Professor in
Computer and Information Sciences
at the University of Massachusetts, Dartmouth, USA.
He received the Ph.D. and MS (Honors) degrees in Computer Science from
the University of Wollongong,
Australia, and a BE in Electronics Engineering from the University of Bombay.
Between 1997 and 1999, he worked
at the IBM Tokyo Research Laboratory as a Postdoctoral Researcher and
Books I've co-authored
- Protocols for Authentication and Key Establishment, Springer, 2003 (with Colin Boyd).
Protocols for Authentication and Key Establishment,
Springer, 2018, second edition (with Colin Boyd and Douglas Stebila). In press.
Selected Professional Service
I'm a member of ACM and IEEE, and a life member of the Cryptology Research
Society of India.
I am a member of the editorial board of Sadhana (2018-2021).
I have served on the following conference committees:
- Program Co-Chair:
- General Co-Chair:
- Steering Committee Member:
- Program Commitee Member:
3rd Workshop on Blockchain Technologies and its Applications,
ACM Compute 2016,
I have served on the DeitY committee for e-Authentication standards constituted by the Ministry of Communications and Information Technology, Govt. of India.
Referee for over 12 journals including Information Processing Letters, Computers & Security, Information Sciences, IEEE TIFS, IEEE TSC, and IET Information Security.
Grant reviewer for the Swiss National Science Foundation (2015).
External Thesis Examiner: IIT Guwahati (2012), QUT (2008).
A list of my publications can be found here.
My author pages on Google Scholar
I received the 1997 Australian Computer Science Association Best Paper Award for the paper
"Causality, partial orders, and lower bounds on rounds for a class of authentication protocols".
I am currently involved as co-PI (Indian side) in the Indo-French project,
"Study of Privacy, Accountability and Ownership in IoT".
I was PI (Indian side) of a project supported by DST and JST under
India-Japan cooperative program.
Courses I've offered
I have taught a variety of courses including
Systems Software, Data Structures, Security Protocols, System and Network Security, and Introduction to Cryptography.
I enjoy working with motivated students with strong programming skills.
Graduated PhD student: Naveen Kumar (thesis defended successfully May, 2017)
- Current students: Pranav Verma, Harshul Vaishnav, Kruti Sheth
- Recent SRI Students: Chinmay Gameti, Rishi Bhatt, Ronak Odhaviya, Harshil Sukhadia, Akshar Varma
- BTP/Mini-project alumni
- Anamika Modi (B.Tech 2018) → Visa
- Sneha Mandan (B.Tech 2018) → Factset
- Smriti Sharma (B.Tech 2018) → CMU
- Aalisha Dalal (B.Tech 2018) → UCLA
- Varun Garg (B.Tech 2017) → NC State University
- Miti Mazmudar (B.Tech 2016) → University of Waterloo
- Anuroop Kuppam (B.Tech 2015) → smallcase → UMass Amherst
- Aditya Basu (B.Tech 2014) → Directi → Penn State University
Arohi Patel, Automatic Compact Alphanumeric Encoding of Shellcode, 2016.
Sunil Arora, Multipath Veritification Defense against SSL Stripping Attack,
Bhupendra Rajput, Improved Authenticated Packet Marking for IP traceback,
Anshu Yadav, Modelling and Detecting Attacks Against Key Agreement Protocols,
Shefali Jain, Enhancement of Misbehavior Detection Scheme for Vehicular Ad-hoc Networks, 2012.
Shaik Basha, Improvement of RAD Technique for Detecting Reflector based DoS Attack, 2012.
Anil Mundra, A Prolog based Approach to Reasoning about Dynamic Hierarchical Key Assignment Schemes, 2011.
Ankit Sethi, Performance Evaluation of Kerberos Cross-realm Authentication using Simnet, 2011.
Shraddha Soni, Formal Analysis of Two Standardized Protocols Using Strand Spaces, 2008.
Tejaskumar Shah, Improvement of Tagged Architecture for Preventing Software Vulnerabilities, 2008.
Jai Gahlot, Security Analysis of Two Fair Exchange Protocols,
Praveen Vadnala, Secure and efficient key assignment scheme for dynamic access control, 2006.
Abhay Jain, Protecting Structures on Heap from Buffer Overflow Vulnerabilities with TIED - LibsafePlus, 2005.
Ekata Mandot, Traitor Tracing for XML Documents, 2005.
Pooja Kamra, ACIDS: Automated Co-stimulation based Intrusion detectiong system with a sense of Dynamic self, 2005.
Shivani Agrawal, "An improved algorithm for modular multiplication and its application to block cipher RC6", 2004.
Nirav Panchal,"Protecting mobile agents against malicious hosts using trusted computing", 2004.
Rajul Jain, "Contributions to Parasitic Computing", 2004.
Dheeraj Tandon, Covert communication in TCP/IP network, 2003.
Pawan Jadia, "Energy Efficient Secret Aggregation in Wireless Sensor Networks",