Papers in International refereed Journals :
-
Aparna S. Pande, Y. V. Joshi, Manisha Y. Joshi “Analysis of Tree structure for Secure Group Communication Using LKH Approach” International Journal of Computer Sciences and Engineering Vol.-7, Issue-3, Mar 2019 E-ISSN: 2347-2693. https://doi.org/10.26438/ijcse/v7i3.11301136
-
Aparna Y. Ladekar , M.Y.Joshi “Classification of Concept Drifting Data Streams Using Adaptive Novel-Class Detection” International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, ,pp. 514-520 ( Google Scholar,DOAJ) September-2016 ISSN (O): 2349-7084.
-
Aparna S. Pande, Y. V. Joshi, Manisha Y. Joshi “Analysis on Logical Key Hierarchy and Variants for Secure Group Communication”, ICCASP 2018, Book chapter, Springer-Atalntis, Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810), ISSN 2194-5357
-
Vinod I. Jondhale, Manisha Y. Joshi, “Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption” International Journal of Science and Research (IJSR) , Volume 7 Issue 4, April 2018, PP 980-983ISSN (Online): 2319-7064
-
Aman Bhimrao Kamble, M. Y. Joshi, "Cloud Data Security Using Third Party Auditor", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.340-344, May-June-2018.
-
Vaidehi V. Mantri, M. Y. Joshi, "A Secure End-To-End Protocol for Secure Transmission of SMS", International Journal of Science and Research (IJSR), Volume 7 Issue 4, April 2018, 1042 – 1047
-
Manisha Y. Joshi and R.S. Bichkar “ A Centralized Key Table based Communication Efficient Group Key management protocol” International Journal of computer science and internet security(IJCNIS) Mecs Press vol 7 , No.8, July 2015- 07-07 PP-48-55
-
Manisha Y. Joshi and R.S. Bichkar, “ An efficient Group Key Transport Protocol” , International Journal of Computer Science and Information Technologies, Vol. 5 (1) ,2014, 462-465
-
Amit N Thakre ,M.Y. Joshi “ Performance Analysis of AODV and DSR routing protocol in Moblile adhoc Networks ” International Journal on Computer Application, IJCA special issue on MANET’s, 2010, pp 211-218.
|
Papers in International Conference :
Sr. No. |
Name of Author(s) |
Full Title of the Paper |
Conference Name |
Conference held at |
Duration of Conference |
1 |
Manisha Y. Joshi , R. S. Bichkar |
“ Scalable key transport protocol using Chinese remainder theorem” |
Internationalsymposim on security in computing and communications(SSCC’ 2013),Mysore, India,published in Springer LNCS, CCIS 377, ISSN no 1865-0929, pp 397-402 |
Mysore, India, |
August 22-24, 2013 |
2 |
M.Y. Joshi, R.S. Bichkar |
“Authentication for remote voting using visual cryptography” |
IComputer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference |
|
9-11 July 2010. |
3 |
PallaviChavan, M.Y. Joshi |
“A Literature Survey: Face Recognition” |
International conference on network security and workshop,January 2007 Erode( Tamilnadu). |
|
January 2007 |
4 |
Md. Mohammad Aijaz Ahmed, M.Y. Joshi |
“ simple and efficient solution to remote user authentication using smart cards” |
Third IEEE International Conference on Innovations in Information Technology (IIT'06), Dubai. |
|
- |
5 |
N.L. Gavankar, Ms M.Y. Joshi, |
“Steganography; A new trand in information Warefare and security”. |
IEEE International conference on Advances in computer vision and information technology. |
Aurangabad. |
December 2007 |
6 |
Anil Wakekar, M.Y. Joshi, |
“Secure Image Communication Techniques: A Review” |
International Conference on Emerging Trends in Engineering 2008 PravaraNagar , Loni. |
|
2008 |
7 |
Mr. PrafulPardhi , M.Y. Joshi, |
“The Advantages Of Elliptic Curve Cryptography For Wireless Security” |
International conference on Emerging trends in computing electronics, Embedded sysytem and VLSI design, 20-21st March 2008 ,Padmashri Dr. V. VikhePatil College of Engineering, Ahmednager. |
|
20-21st March 2008 |
8 |
M.Y. Joshi, S.N. Talbar, Y.V. Joshi |
“ Monochrome and color image compression using Subband coding” |
ICCCD at IIT Kahragpur Dec 2000. |
|
Dec 2000. |
9 |
Navin Kumar, M.Y.Joshi |
“Analysis of academic data using Ad-hoc association rule mining from star schema”, |
International Seminar on IT in Academics, (ITA-2009) Sinhgad institute of Management, Vadgaon(BK), Pune 20-22 Feb 2009. |
|
20-22 Feb 2009. |
|
M.E. Guidance :
Sr. No. |
Name of Student |
Full Title of the Thesis |
Year of Completion |
1 |
Mr. FRANK A. A. |
Detection of Denial of Service Attacks using Traffic Analysis & Resource Utilization |
2005 |
2 |
Ms. KALE SARIKA |
System Administration on Mobile |
205 |
3 |
Mr. BHOSLE R. S. |
Speech Recognition by Adaptive - Directed Acylic Graph Support Vector Machine |
2007 |
4 |
Mr. GAVANKAR NITIN L |
A Stenographic Method for Hiding Data in VQ Encoded Images using SOC |
2011 |
5 |
ABDUL MUJEEB SIDDIQUI |
Router control mechanism for congestion avoidance in CDMA-RAN |
2007 |
6 |
AMBESANGE ASHISH |
Image Watermarking using Secret & Public Key Cryptography |
2011 |
7 |
JADHAV REKHA P. |
Image Encryption using T-Matrix |
2009 |
8 |
MOHAMMAD AIJAZ AHMED |
A Secure & Efficient Dynamic ID-Based Remote user Authentication Scheme |
2007 |
9 |
NANDEDKAR KIRTI K. |
Dynamic Router Table Design using B-Tree |
2009 |
10 |
PARDHI P.R. |
Reversible Watermarking using Difference Expansion |
2010 |
11 |
CHAVAN PALLAVI VIJAY |
Authentication for Remote Voting Visual Cryptography |
2007 |
12 |
JOSHI APARNA M. |
Analysis of Key Management System Based on High Order Tree for Secure Multicast |
2010 |
13 |
TRIVEDI NAVIN KUMAR |
Analysis of Academic Data using AD-HOC Association Rule |
2007 |
14 |
WAKEKAR ANIL LAXMANRAO |
Secure Image Communication using Vector Quantisation |
2010 |
15 |
KHANDARKAR KIRAN RAMESH |
Analysis of Group Key Management Scheme using One Way Function Tree |
2011 |
16 |
MAPARI RAHUL BHAGWATRAO |
Adaptive Key Management Protocol |
2011 |
17 |
THAKARE AMIT NASHIKRAO |
Analysis of Key Distribution Scheme for the Peer to Peer Secure Group Communication |
2008 |
18 |
BHAMRE BHAVNA RAGHUNATH |
Histogram Based Audio Watermarking |
2009 |
19 |
Histogram Based Audio Watermarking |
Intrusion Detection and Access Control System for Web Servers using LAMP |
2013 |
20 |
KAPRE BHAGYASHRI SUDHAKRAR |
Monochrome and Color Image Watermarking using SVD and DWT |
2010 |
21 |
MIRIKAR ABHIJEET RAMESH |
An Efficient One way Function Multicast Key Distribution Tree using REED Solution Codes |
2009 |
22 |
SHINDE JAYASHRI VISHNU |
An Analysis of NAK Based Loss Recovery in Congestion Control for Reliable Multicast |
2010 |
23 |
SONKAR SHRINIVAS KISHANRAO |
An efficient Authentication System for Critical Sever using 3D Password Scheme |
2010 |
24 |
PAKLE GANESH KALYANRAO |
Performance Analysis of VCP, TCP REND and SACK |
2011 |
25 |
PAWAR PANKAJ PRAKASHRAO |
Internet Congestion Control Scheme Based on Price |
2011 |
26 |
BRAHM DEO SAH |
Accumulation Based Congestion Control System using AQM |
2010 |
|
Other :
OTHER CREDENTIALS:
-
Website Incharge from June 2022
-
PG recognized teacher in Computer Science and Engineering
-
Worked as M.E. Coordinator from June 2004 to May 2009 and Sept 2013 to till the date.
-
Dissertation Examiner for Govt. College of Engineering, Aurangabad (Autonomous)
-
Chief Superintendent and Assistant Chief Superintendent for University examinations Dec. 2009, 2008 and 2002.
-
Worked as reviewer of International journal of Network Security (IJNS).
|