KITSW Main page
Department of Computer Science & Engineering
KITS Warangal
Faculty group mail-id : cse@kitsw.ac.in
 
Faculty Profile
Address/Contact
Office : Room No. 209, Block - II, Dept. of CSE
Phone: 0870-2564888(Ext:299)
Mobile: 9848309647
E-mail : pks.cse@kitsw.ac.in

Alternate E-mail : palleboina.kumar@gmail.com
 
Education
B.Tech., Computer Science &Engg., Dr.Paul Raj Engg. College, Bhadrachalam, Andhrapradesh, India (2005)
M.Tech., Computer Science & Engg., Jayamukhi Institute of Technology and Science, Narsampet, Warangal, Telangana, India (2009)
Ph.D., Computer Science & Engg., JNTU, Hyderabad, Telangana, India (2020)
Dr. P. Kumaraswamy
Assistant Professor
Dept. of Computer Science & Engg.
Academic Research IDs
Vidwan ID: 181715
SCOPUS ID: 57413794200
Researcher ID: ADT-6036-2022
Google Scholar ID: 4A9Y0wkAAAAJ
ORCID ID: 0000-0003-1142-2594
 
 
ACADEMIC AFFILIATION
Details

FromTo

Name of the Organization
Assistant Professor

June, 2022

Till Date

 

Kakatiya Institute of Technology & Science, Warangal
Assistant Professor

May, 2007

May,2022

 
SR Engineering College; Hanamkonda, Telangana.
Adhoc Lecturer

August, 2005

April, 2007

 
Kakatiya Institute of Technology & Science, Warangal
RESEARCH INTERESTS
  • Cryptography, Cyber Security, Blockchain Technologies
PUBLICATIONS
Publications  in Refereed Journals

S. No

Details

1

“High Speed Attack Detection in the Network” Research Journal of Computer Systems Engineering- An International Journal (RJCSE-IJ), Vol 02, Issue 02, July 2011, ISSN: 2230-8563; PP 53-58 e-ISSN-2230-8571

2

“Research on Secure Distributed Online Certification Authority” International Journal of Research and Computational Technology (IJRCT), Vol.2 Issue.3, June 2012, ISSN: 0975-5665

3

“Hybrid Approach: Combining Classical Cryptography and QKD for Password Authentication”, International Journal of Computer Science & Communication Networks (IJCSCN), Vol. 2, Issue: 4, August-September 2012, pp: 512-515, ISSN: 2249-5789
4
“Key Management Scheme on Block Cipher” International Journal of Computer Science and Management Research, Vol 1 Issue 3, October 2012, ISSN 2278-733X
5
“Authentication in Android Smart Phones Using Gestures and Security Pin” International Journal of Engineering Research and Application (IJERA), Vol. 3, Issue 6, Nov-Dec 2013, ISSN : 2248-9622,pp.01-05
6
“A Framework for Single Sketch Based Multibiometric Cryptosystems” International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 6, Nov-Dec 2013, ISSN : 2248-9622, pp.1810-1814
7
“A framework for Filtering Abusive Messages for Privacy in Social Networks” International Journal of Research in Computer Applications and Robotics, Vol.3 Issue.2, February 2015 ,ISSN 2320-7345, Pg.: 79-89
8
“A New Key Authentication Scheme for Cryptosystems Based on Discrete Logarithms” Journal of Innovation in Computer Science and Engineering, Vo1.5, Issue1, July,2015, ISSN 2278-0947,pp 42-47
9
“Novel Framework For Secure Authentication in Mobile And Pervasive Computing” International Journal For Technological Research In Engineering, Vol.3 Issue.4, December,2015 ,ISSN 2347 – 4718
10
“Secure Message Authentication in Pervasive Computing” International Journal For Technological Research In Engineering, Vol.3 Issue.4, December,2015 ,ISSN 2347 – 4718
11
“A Framework for Secure Access Control With Anonymous Id” International Journal For Technological Research In Engineering, Vol.3 Issue.4, December,2015 ,ISSN 2347 – 4718
12
“ A Novel Token Based Approach for Packet Loss Using Tokens at the Network Edge” International Journal For Technological Research In Engineering, Vol.3 Issue.4, December,2015 ,ISSN 2347 – 4718
13
“Key Authentication Scheme based on discrete logarithms and Chinese remainder theorem” , Defense science Journal Vol. 66, No.6, November 2016, pp. 590-593,(SCIE Journal) DOI: 10.14429/dsj.66.9649
14
“Empirical Study of a Key Authentication Scheme in Public Key Cryptography”, Int. Journal of Engineering Research and Application, ISSN : 2248-9622, Vol. 7, Issue 3, pp.79-86,2017
15
“Design of improved Reversible Data hiding in Encrypted images”, International Journal   of Research, ISSN : 2348-6848, Vol. 4, Issue 10, pp.175-180, 2017
16
“Leveraging data de-duplication to improve performance of primary storage systems in the cloud ”, International Journal   of Engineering Technology and computer research, ISSN : 2348-2117, Vol. 5, Issue 4, pp.150-155, 2017
17
“Functioning of secure key authentication scheme in public key cryptography” International Journal of Pure and Applied Mathematics, ISSN: 1314-3395, Volume 118 Issue 14,pp.27-32, 2018
18
“Dynamic key acknowledgement quick recoverable auditing in cloud resourceful system”, International Journal of Pure and Applied Mathematics, ISSN: 1314-3395, Volume 120 Issue 6, pp.115-124,  October, 2018
19
“Caching Strategies based on Data Density Estimation in Mobile Ad-hoc Networks”, International Journal of Engineering & Technology, ISSN: 2227-524X, Volume 7, Issue 18, pp.115-124, October, 2018
20
“Applications of Public Key Cryptography and Functioning Process”, International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075, Volume 8, Issue 6S4, pp.480-482,  April, 2019
21
“Adapting Best Path for Mobile Robot By Predicting Obstacle Size”, International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075, Volume 8, Issue 9S2, pp.200-202,  April, 2019
22
“An Introduction to Cryptography and Blockchain System”, Journal for the Study of Research, ISSN NO: 0039-3347, Volume XI, Issue XII, pp.205-209, December-2019
23
“A Secured Data Protection Mechanism for Cloud Storage System”, TEST Engineering & Management, ISSN: 0193-4120, Volume 82, Page No. 8325 - 8329,  January-February 2020
24
Big data for the comprehensive data analysis of IT organizations” Journal of High Technology Management Research, ISSN - 1047-8310 , June-2023
BOOK CHAPTERS
S.No.
Title of The Text Book
 Name of The Publisher
Edition

Year

1

Key Authentications Schemes in Public Key Cryptography
Lambert Academic Publications, ISBN 978-3-330-06210-8
 
April, 2017
Publications in Refereed Conference Proceedings

S.No

Details

1
“A New Key Authentication Scheme for Cryptosystems Based on Discrete Logarithms” Journal of Innovation in Computer Science and Engineering, Vo1.5, Issue1, July, 2015, ISSN 2278-0947,pp 42-47
2
“Cryptanalysis of Zuhua Shao Key Authentication Scheme” International Conference on Information Security and Privacy (ICISP) November, 2015, Published in Procedia Computer Science, Elsevier, DOI:10.1016/j.procs.2016.02.016
3
“A Survey on Key Authentication Schemes in Public Key Cryptography”, International Conference on recent innovations in engineering and technology (ICRIEAT-2016), ISBN:978-1-5396-2645-9.
4
“Applications of public key cryptography and functioning process”, National Conference on Emerging Trends in Data Science and Intelligent Computing (NCETDDSIC-2018),25th July,2018
5
“Chatbot for College Website” International Conference on Advances in Computer Engineering and Communication Systems,VNR VJIET, Hyderabad, during 13th & 14th August 2020, published in springer proceedings
6
“5G enabled Industrial Internet of Things(IIoT) Architecture for Smart Manufacturing” International Conference on Data Engineering & Communication Technology (ICDECT-2020), Kakatiya Institute of Technology & Science (KITS), Warangal, 25 -26 September, 2020, published in Springer Nature Singapore Pte Ltd. 2021
7
Innovative teaching practice on “software engineering laboratory course” IOP Conference Series: Materials Science and Engineering, 981 (2020) 022076 , doi:10.1088/1757-899X/981/2/022076
8
“Crypto Key protection generated from Images and Chaotic Logistic Maps”, Springer Nature Singapore Pte Ltd. 2021, CCIS 1394, pp. 253–262, 2021
9
“Public key authentication schemes in Assymetric key cryptography“, Elseiver: materialstoday proceedings. https://doi.org/10.1016/j.matpr.2021.02.182, 2214-7853, 2021.
10
“Security architecture models used in online banking” AIP Conference Proceedings 2418, 020070 (2022); https://doi.org/10.1063/5.0082194, May 2022.
11
Demonstrate the performance of social bots in identifying the malicious bots based during communication in social media” AIP Conference Proceedings 2418, 020052 (2022); https://doi.org/10.1063/5.0082276
12
An enhanced traffic control system for vehicles on roads using Raspberry Pi” AIP Conference Proceedings 2418, 020052 (2022); https://doi.org/10.1063/5.0082276
13
Smart Parking System using Raspberry pi” 2nd International Conference on Cognitive and Intelligent Computing (ICCIC) ISBN: 978-981-19-2358-6, 2023
PROFESSIONAL AFFILIATION

S.No

Details

1

Member – Indian Society for Technical Education.
2
Member – Computer Society of India

PATENTS PUBLISHED/FILED

S.No

Details

1

A Patent published with title of invention “ An Authentication scheme using Public key cryptography”, Application No.202041000901 A  on 21/02/2020
COURSES TAUGHT

Undergraduate Level

Courses Taught

Currently Teaching

Course

Semester, Year, Branch

Course

Semester, Year, Branch

C Programming

I Sem, I Yr, All Branches

Data Structures

II Sem, I Yr, CSE

Data Structures

II Sem, I Year

 

Operating System

III Sem, II Year

 

 

Object oriented Programming

IV Sem, II Year

 

 

Cryptography and Network security

III Sem, II Year

 

 

Postgraduate Level

Advanced Data Structures        

I Sem, I Yr, M.Tech (CSE)

   
Information security

II Sem, I Yr, M.Tech (CSE)

 

 

FACULTY DEVELOPMENT PROGRAMMES/SEMINARS/WORKSHOPS ATTENDED

S. No.

Programme

Duration

Organized by

1

workshop on  “Testing Tools”

30-Nov-2007 to  01-Dec-2007

S.R. Engineering College, Warangal

2

Workshop on “Mission 10X”

17-Jan-2011 to 21-Jan-2011

WIPRO Company, India

3

Three day workshop on“LATEX”

05-Sept-2011 to  07-Sept-2011

S.R. Engineering College, Warangal

4

Workshop on “Modern Statistical Techniques & Information Security”

19-Dec-2013 to 21-Dec-2013

Department of Mathematics at NIT Warangal.

5

FDP  on  “Foundations of Cryptography”

19-Dec-2016 to 30-Dec-2016

Ministry of Electronics and Information Technology (MEIT, GOI), NIT Warangal.

6

FDP on  “Cyber Security”

19-Dec-2017 to 24-Dec-2017

Ministry of Electronics and Information Technology (MEIT, GOI), NIT Warangal

7

FDP on “Blockchain Technologies”

17-June-2019 to 28-June-2019

Department of Science & Technology (DST), Govt. of India at S.R.Engineering, Warangal.

8

Online FDP on   “Immersive Virtual Reality

04-Jan-2021 to 08-Jan-2021

SR university, Warangal sponsored by AICTE Training And Learning (ATAL) Academy
9
Attended aThreeDay OnlineFDP “Innovative Developments in Data Science

17-May-2021 to 19-May-2021

Department of Information Technology St. Martin’s Engineering College, Secunderabad, Telanganasponsored by AICTE Training And Learning (ATAL) Academy
10
Attended one week Online FDP  “Cyber Threats and Security Measures

25/07/2022 to 29/07/2022

Information Management and Emerging Engineering Departmentat Kakatiya Institute of Technology and Science, Warangal
11
Attended aFive day Online FDP “Cloud Computing”

07-Aug-2023 to 11-Aug-2023

Wipro TalentNextunder Advanced Technology Program at Kakatiya Institute of Technology and Science, Warangal

 

     

PAPERS PRESENTED IN CONFERENCES/SEMINARS/ WORKSHOPS/SYMPOSIA

S. No.

Title of the Paper presented

Title of Conference/ Seminar etc.

Organized by

1

Cryptanalysis of Zuhua Shao Key Authentication Scheme
International Conference on Information Security and Privacy (ICISP)
G H Raisoni College of Engineering (GHRCE), Nagpur, India

2

A Survey on Key Authentication Schemes in Public Key Cryptography
International Conference on recent innovations in engineering and technology (ICRIEAT-2016)
JNTUH College of Engineering Sultanpur, Sangareddy District,, Telangana, India

INVITED LECTURES IN CONFERENCE/SEMINAR

S. No.

Title of Lecture/ Academic Session
Organized by
1
A seminar on "Funding Opportunities"
School of CS & AI, S.R. University, Warangal

OTHER INFORMATION

S.No

Details

1

Qualified in APSET-2012 conducted by Osmania University-Hyderabad
2
Received certificate of appreciation for demonstrating 10 years of continued commitment and dedication from S.R. Engineering college on 05-09-2017
3
Achieved Merit Certificate in Teaching and learning Process from S.R. Engineering college, Warangal in January, 2009
4
Worked as CSE department organizing committee member in S.R. Engineering college, Warangal for BoS, NBA and NAAC
5
Worked as Incharge of department Workshops / FDP/ seminars / Guest lecturesin S.R.Engineering college, Warangal
6
Worked as M. Tech.  Coordinator from January, 2015 to March, 2021 in S.R.Engineering college, Warangal
7
Worked as Ph.D. Coordinator from April, 2021 to  May, 2022in S.R.University, Warangal
8
Worked as a R&D Coordinator, Dept of CSE from April, 2021 to May, 2022 in S.R. University, Warangal
9
Recognized as a mentor for Project-based learning (PBL)  in JAVA Full Stack organized by Wipro TalentNext Faculty programme on January, 2022
10
Completed certification course on Outcome Based Education of IUCEE conducted by K.L.E. Technology University from September 2017 to January 2018
11
Completed online certification course on Cyber Threats and Attack Vectors from University of Colorado on 06-05-2020
12
Completed online certification course on Programming Fundamentals from Duke University on 09-05-2020
13
Completed online certification course on cyber security and the internet of things from Kennesaw state University on 24-05-2020
14
Completed Hacker Rank Certification on Problem Solving (Basic) on 23-09-2020 (ID: 0EADB516E6BF)
15
Completed Wipro TalentNext Certification assessment in JAVA Full Stack on January, 2022
16
Completed NPTEL online Certification on Programming in JAVA, Jul-Oct 2022
17
Completed NPTEL online Certification on Introduction to Programming in C, Jan-Mar 2023
 
Best viewed in browser Internet Explorer 9 or above with screen_Resolution 1280X1024