Abhishek Parakh, PhD

Associate Professor

  • 237 Citations
  • 7 h-Index
20062019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2006 2019

  • 237 Citations
  • 7 h-Index
  • 32 Conference contribution
  • 11 Article
  • 3 Editorial
Filter
Conference contribution
2019
1 Citation (Scopus)

Analyzing and predicting player performance in a quantum cryptography serious game

Abeyrathna, D., Vadla, S., Bommanapally, V., Subramaniam, M., Chundi, P. & Parakh, A., Jan 1 2019, Games and Learning Alliance - 7th International Conference, GALA 2018, Proceedings. Söbke, H., Gentile, M. & Allegra, M. (eds.). Springer Verlag, p. 267-276 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11385 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum Cryptography
Quantum cryptography
Serious Games
Exercise
Security of data

An approach towards designing problem networks in serious games

Parakh, A., Chundi, P. & Subramaniam, M., Aug 2019, IEEE Conference on Games 2019, CoG 2019. IEEE Computer Society, 8848055. (IEEE Conference on Computatonal Intelligence and Games, CIG; vol. 2019-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum cryptography
Peer to peer networks
Cryptography
Students
Network protocols
2018

Providing variable levels of security in quantum cryptography

Parakh, A., Jan 1 2018, Quantum Communications and Quantum Imaging XVI. Meyers, R. E., Shih, Y. & Deacon, K. S. (eds.). SPIE, 107710R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10771).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum Cryptography
Quantum cryptography
quantum cryptography
Cryptography
Provable Security
2017
3 Citations (Scopus)

QuaSim: A virtual quantum cryptography educator

Parakh, A., Subramaniam, M. & Ostler, E., Sep 27 2017, 2017 IEEE International Conference on Electro Information Technology, EIT 2017. IEEE Computer Society, p. 600-605 6 p. 8053434. (IEEE International Conference on Electro Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum cryptography
Students
Virtual reality
Education
2016
1 Citation (Scopus)

Cheating resistant implicit security

Parakh, A., Jan 4 2016, Proceedings - 2015 IEEE 14th International Symposium on Network Computing and Applications, NCA 2015. Avresky, D. R., Avresky, D. R. & Busnel, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 57-62 6 p. 7371703. (Proceedings - 2015 IEEE 14th International Symposium on Network Computing and Applications, NCA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Peer to peer networks
6 Citations (Scopus)

Correcting rotational errors in three stage QKD

Parakh, A. & Van Brandwijk, J., Jun 27 2016, 2016 23rd International Conference on Telecommunications, ICT 2016. Institute of Electrical and Electronics Engineers Inc., 7500409. (2016 23rd International Conference on Telecommunications, ICT 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum cryptography
Error correction
1 Citation (Scopus)

Linear cryptanalysis of quasigroup block cipher

Gerlock, L. & Parakh, A., Apr 5 2016, Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016. Association for Computing Machinery, Inc, 2897818. (Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SCADA systems
Table lookup
Cryptography

New protocol for quantum public key cryptography

Parakh, A., Feb 18 2016, ANTS 2015 - IEEE International Conference on Advanced Networks and Telecommuncations Systems. IEEE Computer Society, 7413667. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2016-February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum entanglement
Public key cryptography
Quantum cryptography

Quantifying the security of a QKD protocol

Parakh, A., Feb 18 2016, ANTS 2015 - IEEE International Conference on Advanced Networks and Telecommuncations Systems. IEEE Computer Society, 7413637. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2016-February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

entropy
Probability distributions
Entropy
2015
3 Citations (Scopus)

A quantum Diffie-Hellman protocol

Subramaniam, P. & Parakh, A., Feb 6 2015, Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., p. 523-524 2 p. 7035733. (Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Implementing Diffie-Hellman key exchange using quantum EPR pairs

Mandal, S. & Parakh, A., Jan 1 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950006. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Diffie-Hellman
attack
Paramagnetic resonance
Quantum cryptography
5 Citations (Scopus)

Quantum teleportation for keyless cryptography

Parakh, A., Jan 1 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950005. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum Teleportation
cryptography
messages
Cryptography
receivers
1 Citation (Scopus)

Towards a new quasigroup block cipher for a single-chip FPGA implementation

Mahoney, W. & Parakh, A., Oct 2 2015, 24th International Conference on Computer Communications and Networks, ICCCN 2015. Institute of Electrical and Electronics Engineers Inc., 7288479. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field programmable gate arrays (FPGA)
Cryptography
SCADA systems
Computer hardware
Costs
2014
6 Citations (Scopus)

A quantum Diffie-Hellman protocol using commuting transformations

Subramaniam, P. & Parakh, A., Jan 1 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057257. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Cryptanalysis of the quasigroup block cipher

Battey, M. & Parakh, A., Mar 28 2014, Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014. Association for Computing Machinery, Inc, 2737600. (Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
3 Citations (Scopus)

Hardware implementation of quasigroup encryption for SCADA networks

Mahoney, W., Parakh, A. & Battey, M., Oct 14 2014, Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 301-305 5 p. 6924243. (Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Computer hardware
Cryptography
3 Citations (Scopus)

Improving the efficiency of entanglement based quantum key exchange

Parakh, A. & Verma, P., Sep 25 2014, 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 6911853. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum entanglement
Statistical Models
6 Citations (Scopus)

Limits on detecting eavesdropper in QKD protocols

Subramaniam, P. & Parakh, A., Jan 1 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057239. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum cryptography
Fiber optic networks
Cryptography
2013
2 Citations (Scopus)

A quantum oblivious transfer protocol

Parakh, A., Dec 2 2013, The Nature of Light: What are Photons? V. 883204. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8832).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oblivious Transfer
Receiver
receivers
Communication
Intuitive
2 Citations (Scopus)

Privacy preserving computations using implicit security

Parakh, A. & Mahoney, W., Dec 1 2013, 22nd International Conference on Computer Communications and Networks, ICCCN 2013 - Conference Proceedings. 6614172. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Cloud computing
Data storage equipment

SEncrypt: An encryption algorithm inspired from biological processes

Bonham-Carter, O., Parakh, A. & Bastola, D., Dec 1 2013, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013. p. 321-327 7 p. 6680858. (Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Proteins
DNA
Bioinformatics
Autocorrelation
2012

A new small world lattice

Parakh, A. & Kak, S., Apr 16 2012, Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Revised Selected Papers. p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7135 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Small-world networks
Small World
Small-world Network
Random Networks
Coefficient

Communication efficient oblivious transfer using elliptic curves

Parakh, A., Dec 1 2012, Proceedings - IEEE 14th International Symposium on High-Assurance Systems Engineering, HASE 2012. p. 173-174 2 p. 6375613. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Communication
7 Citations (Scopus)

Efficient quasigroup block cipher for sensor networks

Battey, M. & Parakh, A., Oct 29 2012, 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings. 6289294. (2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Cryptography
Statistical tests
2011
7 Citations (Scopus)

Matrix based key agreement algorithms for sensor networks

Parakh, A. & Kak, S., Dec 1 2011, ANTS 2011 - 5th IEEE International Conference on Advanced Networks and Telecommunication Systems. 6163684. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Sensor networks
Communication
Sensors
communication
2010
4 Citations (Scopus)

A tree based recursive information hiding scheme

Parakh, A. & Kak, S., Aug 13 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5502430. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data structures
Network protocols
5 Citations (Scopus)

Efficient key management in sensor networks

Parakh, A. & Kak, S., Dec 1 2010, 2010 IEEE Globecom Workshops, GC'10. p. 1539-1544 6 p. 5700196. (2010 IEEE Globecom Workshops, GC'10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
management
resources
2009
9 Citations (Scopus)

A distributed data storage scheme for sensor networks

Parakh, A. & Kak, S., Dec 1 2009, Security and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009, Revised Selected Papers. p. 14-22 9 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 17 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Data storage equipment
Cryptography
Sensors
2 Citations (Scopus)

A key distribution scheme for sensor networks using structured graphs

Parakh, A. & Kak, S., Dec 1 2009, 2009 International Conference on Emerging Trends in Electronic and Photonic Devices and Systems, ELECTRO '09. p. 10-13 4 p. 5441184. (2009 International Conference on Emerging Trends in Electronic and Photonic Devices and Systems, ELECTRO '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
5 Citations (Scopus)

Recursive secret sharing for distributed storage and information hiding

Parakh, A. & Kak, S., Dec 1 2009, 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems, ANTS 2009. 5409868. (2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems, ANTS 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Sensor networks
Cryptography
2008
1 Citation (Scopus)

Internet voting protocol based on implicit data security

Parakh, A. & Kak, S., Dec 26 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 743-746 4 p. 4674300. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Internet
Network protocols
Servers
Electronic commerce
2006
2 Citations (Scopus)

Oblivious Transfer using Elliptic Curves

Parakh, A., Dec 1 2006, Proceedings - 15th International Conference on Computing, CIC 2006. p. 323-328 6 p. 4023828. (Proceedings - 15th International Conference on Computing, CIC 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography