Saurabh Jain

Saurabh Jain

Assistant Professor

B.E.(Information Technology) Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal

 M.Tech(Information Security) MANIT Bhopal
 

Area of Specialization

Information & Network Security, Computer Networks

 

Research & Publications

 International Journals
 
Published “Detection of JavaScript vulnerabilities at Client Agent” in International Journal of Scientific & Technology Research (IJSTR) ISSN: 2277-8616 Volume 1, Issue 7, and PP.36-41 in August 2012. URL: http://www.ijstr.org/final-print/August2012/Detection-of-Javascript-Vulnerability-At-Client-Agen.pdf
 
Published “An Efficient Modular Approach of Intrusion Prevention in Wireless Sensor Networks” in International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, volume 2 Issue 5, pp.11-14 in November 2013. URL: http://www.ijrte.org/v2i5.php.
 
Published “Potential Stir Discovery in Client and Server Side Communication with Automated Way of Communication” in Oriental International Journal of Innovative Engineering Research (OIJIER)”, ISSN: 2321-1806, Volume 2 Issue 1, PP. 16-21 in December 2013.
 
Published “Bitcoin  Mining In India and Obstruction to Acceptance”, Published in International Journal of Engineering Sciences & Research Technology (IJESRT), ISSN: 2277-9655, pp. 532-537, February 2015. URL:http://www.ijesrt.com/issues%20pdf%20file/Archives-2015/February2015/85BITCOIN%20MININ G%20IN%20 INDIA%20AND%20OBSTRUCTION%20TO%20ACCEPTANCE.pdf
 
Published “A Survey on Various Techniques of Energy Consumption on Cloud Network” International Journal of Scientific & Engineering Research, ISSN 22295518, Volume 6, Issue 5, pp. 827-831, May 2015. URL:http://www.ijser.org/paper/A--Survey-on-Various-Techniques-of-Energy-Consumption-on-Cloud-Network.html
 
Published Accurate Localization of Wireless Sensor Node Using Genetic Algorithm And Kalman Filter” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. II (Mar-Apr. 2016), PP 24-30. URL:http://www.iosrjournals.org/iosr-jce/papers/Vol18-issue2/Version2/ C1802022430. Pdf
 
Published “Security Enhancement of SHA with Less Execution Time and Larger Bit Difference” Engineering Universe for Scientific Research and Management, ISSN 2319-3069, Vol. 8 Issue 5 , pp. 1-6, May 2016. URL: http://eusrm.com/ Published Paper/8Vol/Issue5/2016EUSRM5201636982-cc022482-6860-4fb4-938e-233d349 b4ca113737.pdf
 
Published “Load Balancing Algorithms in Cloud Computing: An Extensive Survey” International Journal of Engineering Science and Computing (IJESC), ISSN 2321 3361, Volume 6 Issue No. 6, pp. 7463-7468, June 2016. URL:http://ijesc.org/upload/f30c059815a80a54adb64911a427302a.Load%20 Balancing%20Algorithms%20in%20Cloud%20Computing%20An%20Extensive%20Survey.pdf
 
Published “Analysis of Extended Security Model based on Smart Card using Anonymous Two Factor Authentication Key Exchange Protocol” International Journal of Emerging Technology and Advanced Engineering ISSN 22502459, ISO 9001:2008 Certified Journal Volume 7, Issue 6, June 2017.http://www.ijetae.com/files/Volume7Issue6/IJETAE_0617_50.pdf
 
Published “A Review: Smart Card Based PAKE Protocol on Distributed System”  International Journal of Engineering Technology and Applied Science (ISSN: 2395 3853), Vol. 3 Issue 6 June 2017. 
 
International Conferences
 
Published “Automated Process of Server and Client Environment with attack alert based on DES” in  2014 Fourth International Conference on Communication Systems and Network Technologies Print ISBN: 978-1-4799-3069-2 DOI: 10.1109/CSNT.2014.155 ,pp 739-742,7-9 April 2014.Publisher:IEEE. URL:  http://ieeexplore.ieee.org/ document/ 6821497/
 
Published “Profile based Scheme against DDoS Attack in WSN”, in  2014 Fourth International Conference on Communication Systems and Network Technologies Print ISBN: 978-1-4799-3069-2 DOI: 10.1109/CSNT.2014.31 ,pp 112-116 ,7-9 April 2014.Publisher:IEEE.  URL: http://ieeexplore.ieee.org/document/6821368/
 
 
Published “An Efficient Technique for Energy Consumption in Distributed Cloud Network using Ant Technique”, in  2015 International Conference on Information Technology (ICIT) Print ISBN: 978-1-5090-0486-7 DOI: 10.1109/ICIT.2015.31 ,pp 71-75 , 21-23 Dec. 2015.Publisher: IEEE. URL: http://ieeexplore.ieee.org/document /7437593/
 
Published “Secure transmission of 2D image using randomized chaotic mapping”, in 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Electronic ISBN: 978-1-5090-0669-4 DOI: 10.1109/CDAN.2016.7570870 ,18-19 March 2016. Publisher:IEEE. URL:  http://ieeexplore.ieee.org/document/7570870/
 
Book Published  
 
Java Technology (In Progress)